reauthentication time through rsa-pubkey

Size: px
Start display at page:

Download "reauthentication time through rsa-pubkey"

Transcription

1 reauthentication time through rsa-pubkey reauthentication time, page 3 reconnect, page 5 redirect (identity policy), page 6 redirect gateway, page 7 redundancy (cs-server), page 8 redundancy (firewall), page 11 redundancy (GDOI), page 12 redundancy asymmetric-routing enable, page 14 redundancy group, page 15 redundancy group (interface), page 16 redundancy inter-device, page 18 redundancy rii, page 20 redundancy stateful, page 22 regenerate, page 24 regexp (profile map configuration), page 26 registration interface, page 28 registration periodic crl trustpoint, page 30 registration retry count, page 31 registration retry interval, page 33 registration retry-interval (TIDP), page 35 rekey address ipv4, page 37 rekey algorithm, page 39 rekey authentication, page 41 rekey lifetime, page 43 1

2 reauthentication time through rsa-pubkey rekey retransmit, page 45 rekey sig-hash algorithm, page 47 rekey transport unicast, page 48 remark, page 50 remark (IPv6), page 52 replay counter window-size, page 54 replay time window-size, page 56 request-method, page 58 request-queue (GTP), page 60 request-timeout, page 61 reset (policy-map), page 62 reset (zone-based policy), page 63 responder-only, page 64 retired (IPS), page 65 retransmit (config-radius-server), page 67 reverse-route, page 69 revocation-check, page 74 revocation-check (ca-trustpool), page 77 root, page 80 root CEP, page 82 root PROXY, page 83 root TFTP, page 84 route accept, page 85 route set, page 86 route set remote, page 88 router-preference maximum, page 89 rsakeypair, page 91 rsa-pubkey, page 93 2

3 reauthentication time through rsa-pubkey reauthentication time reauthentication time To enter the time limit after which the authenticator should reauthenticate, use the reauthentication timecommand in local RADIUS server group configuration mode. To remove the requirement that users reauthenticate after the specified duration, use the no form of this command. reauthentication time seconds no reauthentication time seconds Syntax seconds Number of seconds after which reauthentication occurs. Range is from 1 to Default is 0. Default 0 seconds, which means group members are not required to reauthenticate. Modes Local RADIUS server group configuration History 12.2(11)JA 12.3(11)T This command was introduced on the Cisco Aironet Access Point 1100 and the Cisco Aironet Access Point This command was integrated into Cisco IOS 12.3(11)T and implemented on the following platforms: Cisco 2600XM, Cisco 2691, Cisco 2811, Cisco 2821, Cisco 2851, Cisco 3700, and Cisco 3800 series routers. Examples The following example shows that the time limit after which the authenticator should reauthenticate is 30 seconds: Router(config-radsrv-group)# reauthentication time 30 Related s block count clear radius local-server debug radius local-server Configures the parameters for locking out members of a group to help protect against unauthorized attacks. Clears the statistics display or unblocks a user. Displays the debug information for the local server. 3

4 reauthentication time reauthentication time through rsa-pubkey group nas radius-server host radius-server local show radius local-server statistics ssid user vlan Enters user group configuration mode and configures shared setting for a user group. Adds an access point or router to the list of devices that use the local authentication server. Specifies the remote RADIUS server host. Enables the access point or router to be a local authentication server and enters into configuration mode for the authenticator. Displays statistics for a local network access server. Specifies up to 20 SSIDs to be used by a user group. Authorizes a user to authenticate using the local authentication server. Specifies a VLAN to be used by members of a user group. 4

5 reauthentication time through rsa-pubkey reconnect reconnect To enable Internet Key Exchange Version 2 (IKEv2) support for the Cisco AnyConnect Reconnect feature, use the reconnect command in IKEv2 profile configuration mode. To disable IKEv2 reconnect, use the no form of this command. reconnect [timeout seconds] no reconnect Syntax timeout seconds (Optional) Interval, in seconds. The range is from 600 to The default is Default The IKEv2 reconnect is disabled. Modes IKEv2 profile configuration (crypto-ikev2-profile) History 15.4(1)T Cisco IOS XE 3.11S This command was introduced. This command was integrated into Cisco IOS XE 3.11S. Usage Guidelines The Auto Reconnect feature in the Cisco AnyConnect client helps the Cisco AnyConnect VPN client to remember the session for a period of time and to resume the connection when a network goes down or a client drops out of network after establishing the secure channel. As AnyConnect Client is extensively used with IKEv2, IKEv2 extends the Auto Reconnect feature support on IOS through the IOS IKEv2 support for Auto Reconnect feature of AnyConnect feature. Examples The following example shows how to configure an IKEv2 profile with a reconnect interval of 900 seconds: Device(config)# crypto ikev2 profile profile2 Device(config-ikev2-profile)# reconnect 900 Related s crypto ikev2 profile Configures an IKEv2 profile. 5

6 redirect (identity policy) reauthentication time through rsa-pubkey redirect (identity policy) To redirect clients to a particular URL, use the redirectcommand in identity policy configuration mode. To remove the URL, use the no form of this command. redirect url url no redirect url url Syntax url url URL to which clients should be redirected. Valid URL. Default No default behavior or values Modes Identity policy configuration (config-identity-policy) History 12.3(8)T 12.2(33)SXI This command was introduced. This command was integrated into Cisco IOS 12.2(33)SXI. Usage Guidelines When you use this command, an identity policy has to be associated with an Extensible Authentication Protocol over UDP (EAPoUDP) identity profile. Examples The following example shows the URL to which clients are redirected: Router (config)# identity policy p1 Router (config-identity-policy)# redirect url Related s identity policy Creates an identity policy. 6

7 reauthentication time through rsa-pubkey redirect gateway redirect gateway To configure an Internet Key Exchange Version 2 (IKEv2) redirect mechanism on a gateway for specific profiles, use the redirect gateway command in IKEv2 profile configuration mode. To remove the redirects mechanism, use the no form of this command. redirect gateway auth no redirect gateway Syntax auth Enables the redirects mechanism on the gateway upon security association (SA) authentication. Default The redirects mechanism is disabled. Modes IKEv2 profile configuration (config-ikev2-profile) History 15.2(4)M Cisco IOS XE 3.8S This command was introduced. This command was integrated into Cisco IOS XE 3.8S. Usage Guidelines Use this command to enable the redirect mechanism on the gateway when authenticating an SA for specific IKEv2 profiles. A thorough security analysis shows that redirect during IKE_AUTH is neither more nor less secure than redirect during IKE_INIT. However, for performance and scalability reasons, we recommend redirect during IKE_INIT. Examples The following example shows how to enable the redirects mechanism: Device> enable Device# configure terminal Device(config)# crypto ikev2 profile prof1 Device(config-ikev2-profile)# redirect gateway auth Related s crypto ikev2 cluster Defines an IKEv2 cluster policy in an HSRP cluster. 7

8 redundancy (cs-server) reauthentication time through rsa-pubkey redundancy (cs-server) To specify that the active certificate server (CS) is synchronized to the standby CS, use the redundancy command in certificate server configuration mode. To return to the default, use the no version of this command. redundancy Syntax This command has no arguments or keywords. Default Redundancy is not configured for the certificate server. Modes Certificate server configuration (cs-server) History 12.3(4)T This command was introduced. Usage Guidelines You must configure the crypto pki server command with the name of the certificate server in order to enter certificate server configuration mode and configure this command. Use the redundancy command only if the your router has redundant capabilities for an active and standby CS. Examples Router(config)#crypto pki server CA Router(cs-server)#redundancy Related s auto-rollover cdp-url crl (cs-server) crypto pki server Enables the automated CA certificate rollover functionality. Specifies a CDP to be used in certificates that are issued by the certificate server. Specifies the CRL PKI CS. Enables a CS and enters certificate server configuration mode, or immediately generates shadow CA credentials 8

9 reauthentication time through rsa-pubkey redundancy (cs-server) database archive database level database url database username default (cs-server) grant auto rollover grant auto trustpoint grant none grant ra-auto hash (cs-server) issuer-name Specifies the CA certificate and CA key archive format--and the password--to encrypt this CA certificate and CA key archive file. Controls what type of data is stored in the certificate enrollment database. Specifies the location where database entries for the CS is stored or published. Specifies the requirement of a username or password to be issued when accessing the primary database location. Resets the value of the CS configuration command to its default. Enables automatic granting of certificate reenrollment requests for a Cisco IOS subordinate CA server or RA mode CA. Specifies the CA trustpoint of another vendor from which the Cisco IOS certificate server automatically grants certificate enrollment requests. Specifies all certificate requests to be rejected. Specifies that all enrollment requests from an RA be granted automatically. Specifies the cryptographic hash function the Cisco IOS certificate server uses to sign certificates issued by the CA. Specifies the DN as the CA issuer name for the CS. 9

10 redundancy (cs-server) reauthentication time through rsa-pubkey lifetime (cs-server) mode ra mode sub-cs serial-number (cs-server) show (cs-server) shutdown (cs-server) Specifies the lifetime of the CA or a certificate. Enters the PKI server into RA certificate server mode. Enters the PKI server into sub-certificate server mode Specifies whether the router serial number should be included in the certificate request. Displays the PKI CS configuration. Allows a CS to be disabled without removing the configuration. 10

11 reauthentication time through rsa-pubkey redundancy (firewall) redundancy (firewall) To enable firewall high availability (HA), use the redundancy command in parameter-map type inspect configuration mode. To disable the firewall, use the no form of this command. redundancy no redundancy Syntax This command has no arguments or keywords. Default The firewall is disabled. Modes Parameter-map type inspect configuration (config-profile) History 15.2(3)T This command was introduced. Examples Device>configure terminal Device(config)#parameter-map type inspect global Device(config-profile)# redundancy Related s parameter-map type inspect global Configures a global parameter map. 11

12 redundancy (GDOI) reauthentication time through rsa-pubkey redundancy (GDOI) To enable Group Domain of Interpretation (GDOI) redundancy configuration mode and to allow for key server redundancy, use the redundancy command in GDOI local server configuration mode. To disable GDOI redundancy, use the no form of this command. redundancy no redundancy Syntax This command has no arguments or keywords. Default Key server redundancy is not supported for a key server. Modes GDOI local server configuration (config-local-server) History 12.4(11)T Cisco IOS XE 2.3 This command was introduced. This command was implemented on the Cisco ASR 1000 series routers. Usage Guidelines This command must be configured before configuring related redundancy commands, such as for key server peers, local priority, and timer values. Use the local priority command to set the local key server priority. Use the peer address ipv4command to configure the peer address that belongs to the redundancy key server group. Examples The following example shows that key server redundancy has been configured: address ipv redundancy local priority 10 peer address ipv peer address ipv Related s address ipv4 local priority Sets the source address, which is used as the source for packets originated by the local key server. Sets the local key server priority. 12

13 reauthentication time through rsa-pubkey redundancy (GDOI) peer address ipv4 server local Configures the peer key server. Designates a device as a GDOI key server and enters GDOI local server configuration mode. 13

14 redundancy asymmetric-routing enable reauthentication time through rsa-pubkey redundancy asymmetric-routing enable To establish an asymmetric flow diversion tunnel for each redundancy group, use the redundancy asymmetric-routing enable command in interface configuration mode. To remove the established flow diversion tunnel, use the no form of this command. redundancy asymmetric-routing enable no redundancy asymmetric-routing enable Syntax This command has no arguments or keywords. Default An asymmetric routing traffic diversion tunnel is not configured for redundancy groups. Modes Interface configuration (config-if) History Cisco IOS XE 3.5S 15.2(3)T This command was introduced. This command was integrated into Cisco IOS 15.2(3)T. Usage Guidelines You must configure this command on a traffic interface that sends or receives asymmetric routing traffic. A tunnel is established between the traffic interface and the asymmetric routing interface for each redundancy group. Examples The following example shows how to enable redundancy group asymmetric routing on a Gigabit Ethernet interface: Router(config)# interface gigabitethernet 0/0/1 Router(config-if)# redundancy asymmetric-routing enable Related s asymmetric-routing interface Sets up an asymmetric routing link interface and enables applications to divert packets received on the standby redundancy group to the active. Configures an interface and enters interface configuration mode. 14

15 reauthentication time through rsa-pubkey redundancy group redundancy group To configure fault tolerance for the mobile router, use the redundancy group command in mobile router configuration mode. To disable this functionality, use the no form of this command. redundancy group name no redundancy group name Syntax name Name of the mobile router group. Default No default behavior or values. Modes Mobile router configuration History 12.2(4)T This command was introduced. Usage Guidelines The redundancy group command provides f ault tolerance by selecting one mobile router in the redundancy group name argument to provide connectivity for the mobile networks. This mobile router is in the active state. The other mobile routers are passive and wait until the active mobile router fails before a new active mobile router is selected. Only the active mobile router registers and sets up proper routing for the mobile networks. The redundancy state is either active or passive. Examples The following example selects the mobile router in the sanjose group, to provide fault tolerance: ip mobile router redundancy group sanjose address home-agent register lifetime 600 Related s standby name Configures the name of the standby group, which is associated with the mobile router. 15

16 redundancy group (interface) reauthentication time through rsa-pubkey redundancy group (interface) To enable the redundancy group (RG) traffic interface configuration, use the redundancy group command in interface configuration mode. To remove the redundancy group traffic interface configuration, use the no form of this command. redundancy group id {ip virtual-ip ipv6 {link-local-address ipv6-address/prefix-length} autoconfig} [exclusive] [decrement value] no redundancy group id {ip ipv6 {link-local-address ipv6-address/prefix-length}} Syntax id ip virtual-ip ipv6 link-local-address ipv6-address/prefix-length autoconfig exclusive decrement number Redundancy group ID. Valid values are from 1 and 2. Enables IPv4 RGs and sets a virtual IPv4 address. Enables IPv6 RGs. Link local address. IPv6 address and the length of the IPv6 prefix. IPv6 prefix is a decimal value that indicates how many of the high-order contiguous bits of the address comprise the prefix (the network portion of the address). A slash mark must precede the decimal value. Obtains IP addresses through autoconfiguration. (Optional) Specifies whether the interface is exclusive to an RG. (Optional) Specifies the number that is decremented from the priority when the state of an interface goes down. The configured decrement value overrides the default number that is configured for an RG. Valid values are from 1 to 255. Default Redundancy group traffic interface configuration is not enabled. Modes Interface configuration (config-if) History Cisco IOS XE 3.1S 15.2(3)T This command was introduced. This command was integrated into Cisco IOS 15.2(3)T. 16

17 reauthentication time through rsa-pubkey redundancy group (interface) Cisco IOS XE 3.7S This command was modified. The virtual-ip, link-local-address, ipv6-address/prefix-length arguments and ip, ipv6, and autoconfig keywords were added. Usage Guidelines Use this command to configure a redundancy group for stateful switchover. The virtual IP address and the physical address must be in the same subnet. When autoconfiguration is enabled, the interface obtains an IP address automatically. Examples The following example shows how to enable the IPv6 redundancy group traffic interface configuration: Device(config)# interface gigabitethernet 0/0/1 Device(config-if)# redundancy group 2 ipv6 FE80::260:3EFF:FE11:6770 exclusive Related s control data interface name preempt protocol redundancy rii Configures the control interface type and number for a redundancy group. Configures the data interface type and number for a redundancy group. Configures an interface and enters interface configuration mode. Configures the name of a redundancy group. Enables preemption on a redundancy group. Defines a protocol instance in a redundancy group. Configures an RII for a redundancy group. 17

18 redundancy inter-device reauthentication time through rsa-pubkey redundancy inter-device To enter inter-device configuration mode, use the redundancy inter-device command in global configuration mode. To exit inter-device configuration mode, use the exit command. To remove all inter-device configuration, use the no form of this command. redundancy inter-device no redundancy inter-device Syntax This command has no arguments or keywords. Default If this command is not enabled, you cannot configure stateful failover for IPSec. Modes Global configuration History 12.3(8)T This command was introduced. Usage Guidelines Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. If the redundancy inter-device command is configured on the device, and IPSec is configured for stateful failover, IPSec would expect SSO configuration to be complete and would send SA requests only if the device becomes active. If IPSec stateful failover is not needed, then redundancy inter-device need not be configured on the device. Use the redundancy inter-device command to enter inter-device configuration mode, which allows you to enable and protect Stateful Switchover (SSO) traffic. Examples The following example shows how to issue the redundancy inter-device command when enabling SSO: redundancy inter-device scheme standby HA-in!! ipc zone default association 1 no shutdown protocol sctp local-port

19 reauthentication time through rsa-pubkey redundancy inter-device local-ip remote-port 5000 remote-ip ! The following example shows how to issue the redundancy inter-device command when configuring SSO traffic protection: crypto ipsec transform-set trans2 ah-md5-hmac esp-aes! crypto ipsec profile sso-secure set transform-set trans2! redundancy inter-device scheme standby HA-in security ipsec sso-secure Related s local-ip local-port remote-ip remote-port scheme Defines at least one local IP address that is used to communicate with the redundant peer. Defines the local SCTP that is used to communicate with the redundant peer. Defines at least one IP address of the redundant peer that is used to communicate with the local device. Defines the remote SCTP that is used to communicate with the redundant peer. Defines that redundancy scheme that is used between two devices. 19

20 redundancy rii reauthentication time through rsa-pubkey redundancy rii To configure the redundancy interface identifier (RII) for redundancy group protected traffic interfaces, use the redundancy rii command in interface configuration mode. To remove the redundant interface from the redundancy group, use the no form of this command. redundancy rii id [decrement number] no redundancy rii Syntax id decrement number Redundancy interface identifier. The range is from 1 to (Optional) Specifies the decrement value. When the redundant interface is down, the run-time priority of all redundancy groups configured on the router will be decremented. Valid values are from 1 to 255. Default RII is not configured. Modes Interface configuration (config-if) History Cisco IOS XE 3.1S 15.2(3)T This command was introduced. This command was integrated into Cisco IOS 15.2(3)T. The decrement number keyword-argument pair was added. Usage Guidelines Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. Every interface associated with one or more redundancy groups must have a unique RII assigned to it. The RII allows interfaces to have a one-to-one mapping between peers. 20

21 reauthentication time through rsa-pubkey redundancy rii Examples The following example shows how to configure the RII for Gigabit Ethernet interface 0/0/0: Router# configure terminal Router(config)# interface GigabitEthernet 0/0/0 Router(config-if)# redundancy rii 100 Related s application redundancy authentication control data name preempt protocol redundancy group Enters redundancy application configuration mode. Configures clear text authentication and MD5 authentication for a redundancy group. Configures the control interface type and number for a redundancy group. Configures the data interface type and number for a redundancy group. Configures the redundancy group with a name. Enables preemption on the redundancy group. Defines a protocol instance in a redundancy group. Enables redundancy group redundancy traffic interface configuration. 21

22 redundancy stateful reauthentication time through rsa-pubkey redundancy stateful To configure stateful failover for tunnels using IP Security (IPSec), use the redundancy statefulcommand in crypto map configuration mode. To disable stateful failover for tunnel protection, use the no form of this command. redundancy standby-group-name stateful no redundancy standby-group-name stateful Syntax standby-group-name Refers to the name of the standby group as defined by Hot Standby Router Protocol (HSRP) standby commands. Both routers in the standby group are defined by this argument and share the same virtual IP (VIP) address. Default Stateful failover is not enabled for IPSec tunnels. Modes Crypto map configuration History 12.3(11)T This command was introduced. Usage Guidelines The redundancy statefulcommand uses an existing IPSec profile (which is specified via the crypto ipsec profilecommand) to configure IPSec stateful failover for tunnel protection. (You do not configure the tunnel interface as you would with a crypto map configuration.) IPSec stateful failover enables you to define a backup IPSec peer (secondary) to take over the tasks of the active (primary) router if the active router is deemed unavailable. The tunnel source address must be a VIP address, and it must not be an interface name. Examples The following example shows how to configure stateful failover for tunnel protection: crypto ipsec profile peer-profile redundancy HA-out stateful interface Tunnel1 ip unnumbered Loopback0 tunnel source tunnel destination tunnel protection ipsec profile peer-profile! interface Ethernet0/0 22

23 reauthentication time through rsa-pubkey redundancy stateful ip address standby 1 ip standby 1 name HA-out Related s crypto ipsec profile Defines the IPSec parameters that are to be used for IPSec encryption between two routers and enters crypto map configuration mode. 23

24 regenerate reauthentication time through rsa-pubkey regenerate To enable key rollover with manual certificate enrollment, use the regenerate command in ca-trustpoint configuration mode. To disable key rollover, use the no form of this command. regenerate no regenerate Syntax This command has no arguments or keywords. Default Key rollover is not enabled. Modes Ca-trustpoint configuration History 12.3(7)T 12.2(18)SXE 12.2(33)SRA 12.2SX This command was introduced. This command was integrated into Cisco IOS 12.2(18)SXE. This command was integrated into Cisco IOS release 12.(33)SRA. This command is supported in the Cisco IOS 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Usage Guidelines Use the regenerate command to provide seamless key rollover for manual certificate enrollment. A new key pair is created with a temporary name, and the old certificate and key pair are retained until a new certificate is received from the certification authority (CA). When the new certificate is received, the old certificate and key pair are discarded and the new key pair is renamed with the name of the original key pair. If the key pair being rolled over is exportable, the new key pair will also be exportable. The following comment will appear in the trustpoint configuration to indicate whether the key pair is exportable:! RSA keypair associated with trustpoint is exportable Do not regenerate the keys manually; key rollover will occur when the crypto ca enroll command is issued. Examples The following example shows how to configure key rollover to regenerate new keys with a manual certificate enrollment from the CA named trustme2. crypto ca trustpoint trustme2 enrollment url trustme2 24

25 reauthentication time through rsa-pubkey regenerate.company.com/ subject-name OU=Spiral Dept., O=tiedye.com ip-address ethernet0 serial-number none regenerate password revokeme rsakeypair trustme exit crypto ca authenticate trustme2 crypto ca enroll trustme2 Related s crypto ca authenticate crypto ca enroll crypto ca trustpoint Retrieves the CA certificate and authenticates it. Requests certificates from the CA for all of your router s RSA key pairs. Declares the CA that your router should use. 25

26 regexp (profile map configuration) reauthentication time through rsa-pubkey regexp (profile map configuration) To create an entry in a cache profile group that allows authentication and authorization matches based on a regular expression, use the regexp command in profile map configuration mode. To disable a regular expression entry, use the no form of this command. regexp matchexpression {any only} [no-auth] no regexp matchexpression {any only} Syntax matchexpression any only no-auth String representing a regular expression on which to match. Specifies that any unique instance of a AAA server response that matches the regular expression is saved in the cache. Specifies that only one instance of a AAA server response that matches the regular expression is saved in the cache. (Optional) Specifies that authentication is bypassed for this user. Default No regular expression entries are defined. Modes Profile map configuration (config-profile-map) History 12.2(28)SB 12.2(33)SRC 15.0(1)M This command was introduced. This command was integrated into Cisco IOS 12.2(33)SRC. This command was integrated into Cisco IOS 15.0(1)M. Usage Guidelines Use this command to create an entry in a cache profile group that matches based on a regular expression, such as.*@example.com or.*@xyz.com. Because the number of entries in a regular expression cache profile group could be in the thousands, and validating each request against a regular expression can be time consuming, we do not recommend using regular expression entries in cache profile groups. 26

27 reauthentication time through rsa-pubkey regexp (profile map configuration) Examples The following example creates an entry in the cache profile group networkusers that authorizes network access to any example company user. No authentication is performed for these users because the no-auth keyword is used. Router# configure terminal Router(config)# aaa cache profile networkusers Router(config-profile-map)# any no-auth Related s profile Creates an individual authentication and authorization cache profile based on an exact username match. 27

28 registration interface reauthentication time through rsa-pubkey registration interface To specify the interface to be used for a Group Domain of Interpretation (GDOI) registration, use the registration interface command in GDOI local server configuration mode. To disable an interface, use the no form of this command. registration interface type slot/port noregistration interface type slot/port Syntax type slot /port Type of interface (see the table below). Slot and port number of the interface. Default None Modes GDOI local server configuration History 12.4(6)T This command was introduced. Usage Guidelines The table below lists the types of interface that may be used for the type argument. Table 1: Type of Interface Interface Async BVI CDMA-1x CTunnel Dialer Ethernet Async interface Bridge-Group Virtual Interface Code division multiple access 1x interface CTunnel interface Dialer interface Institute of Electrical and Electronics Engineers (IEEE) Standard

29 reauthentication time through rsa-pubkey registration interface Interface Lex Loopback MFR Multilink Null Serial Tunnel Vif Virtual-PPP Virtual-Template Virtual-TokenRing Lex interface Loopback interface Multilink Frame Relay bundle interface Multilink group interface Null interface Serial Tunnel interface Pragmatic General Multicast (PGM) Multicast Host interface Virtual PPP interface Virtual Template interface Virtual TokenRing Examples The following example shows that the interface is Ethernet 0/0: registration interface Ethernet 0/0 Related s crypto gdoi group server local Identifies a GDOI group and enters GDOI group configuration mode. Designates a device as a GDOI key server and enters GDOI local server configuration. 29

30 registration periodic crl trustpoint reauthentication time through rsa-pubkey registration periodic crl trustpoint To enable periodic registrations for the Group Domain of Interpretation (GDOI) key server (KS) when new certificate revocation lists (CRLs) become available for the configured public key infrastructure (PKI) trustpoint certificate authority (CA), use the registration periodic crl trustpoint command in GDOI local server configuration mode. To disable the registration, use the no form of this command. registration periodic crl trustpoint trustpoint-name no registration periodic crl trustpoint trustpoint-name Syntax trustpoint-name Name of the PKI trustpoint CA. Default Periodic registrations are not enabled. Modes GDOI local server configuration (gdoi-local-server) History 15.3(3)M This command was introduced. Examples The following example enables the GET VPN CRL Checking feature on KSs: crypto gdoi group gdoi_group1 Server local registration periodic crl trustpoint mycert Related s crypto gdoi group server local Identifies a GDOI group. Designates a device as a GDOI key server. 30

31 reauthentication time through rsa-pubkey registration retry count registration retry count To configure the number of times that a Transitory Messaging Services (TMS) registration message is sent to a controller, use the registration retry count command in parameter-map configuration mode. To configure the consumer to use the default registration retry count value, use the no form of this command. Note Effective with Cisco IOS 12.4(20)T, the registration retry count command is not available in Cisco IOS software. registration retry count number no registration retry count number Syntax number Number of times that a registration message is retransmitted. A number from 1 through 5 is entered. Default The following default value is used if this command is not configured or if the no form is entered: 3 Modes Parameter-map configuration (config-profile) History 12.4(6)T 12.4(15)XZ This command was introduced. This command was integrated into Cisco IOS 12.4(15)XZ. Usage Guidelines The registration retry count command is entered on a consumer to configure the number of times that an implicit registration request message is transmitted. The consumer must register with the controller before the controller can send Control Information Messages (CIMs). Implicit registration requests are automatically sent to the controller when a TMS type service policy is activated on the consumer. By default, a consumer sends a registration request message to the controller once every 3 minutes for up to three times or until successfully registered. If the consumer is a member of multiple groups, it sends a separate registration request messages to the controller of each group. 31

32 registration retry count reauthentication time through rsa-pubkey Note Explicit registration is configured by entering the tms consumer registration command on a consumer in privileged EXEC mode. This command is unaffected by registration timer configuration and can be used to register the consumer if the count has been exceeded for implicit registration. Examples The following example configures a consumer to send up to five registration messages to a controller: Router(config)# parameter-map type tms PARAMAP_1 Router(config-profile)# controller ipv Router(config-profile)# logging tms events Router(config-profile)# registration retry interval 60 Router(config-profile)# registration retry count 5 Router(config-profile)# exit Related s parameter-map type tms registration retry interval Configures a TMS type parameter map. Configures the length of time between consumer registration attempts. 32

33 reauthentication time through rsa-pubkey registration retry interval registration retry interval To configure the length of time between consumer registration attempts, use the registration retry interval command in parameter-map configuration mode. To configure the consumer to use the default registration timer interval, use the no form of this command. Note Effective with Cisco IOS 12.4(20)T, the registration retry interval command is not available in Cisco IOS software. registration retry interval time no registration retry interval time Syntax time Time, in seconds, between registration attempts. A number from 30 through 3000 can be entered for the seconds argument. Default The following default value is used if this command is not configured or if the no form is entered: 180 Modes Parameter-map configuration (config-profile) History 12.4(6)T 12.4(15)XZ This command was introduced. This command was integrated into Cisco IOS 12.4(15)XZ. Usage Guidelines The registration retry interval command is entered on a consumer to configure the time interval between the transmission of implicit registration request messages. The consumer must register with the controller before the controller can send Control Information Messages (CIMs). Implicit registration requests are automatically sent to the controller when a Transitory Messaging Services (TMS) type service policy is activated on the consumer. By default, a consumer sends a registration request message to the controller once every 3 minutes for up to three times or until successfully registered. If the consumer is a member of multiple groups, it sends a separate registration request messages to the controller of each group. 33

34 registration retry interval reauthentication time through rsa-pubkey Note Explicit registration is configured by entering the tms consumer registration command on a consumer in privileged EXEC mode. This command is unaffected by registration timer configuration and can be used to register the consumer if the count has been exceeded for implicit registration. Examples The following example configures a consumer to send registration messages at 60-second intervals: Router(config)# parameter-map type tms PARAMAP_1 Router(config-profile)# controller ipv Router(config-profile)# logging tms events Router(config-profile)# registration retry interval 60 Router(config-profile)# registration retry count 5 Router(config-profile)# exit Related s parameter-map type tms registration retry count Configures a TMS type parameter map. Configures the number of times that a registration message is sent to a controller. 34

35 reauthentication time through rsa-pubkey registration retry-interval (TIDP) registration retry-interval (TIDP) To configure the length of time and number of attempts for TIDP group registration, use the registration retry-interval command in TIDP group configuration mode. To configure TIDP to use default registration timer values, use the no form of this command. Note Effective with Cisco IOS 12.4(20)T, the registration retry-interval command is not available in Cisco IOS software. registration retry-interval min interval max interval no registration retry-interval Syntax mininterval maxinterval Time interval, in seconds, at which TIDP attempts to register a group member. This argument is entered as a number from 0 through Total time, in seconds, TIDP attempts to register a TIDP group member. The value for this argument can be a number from 0 through Default The following default values are used if this command is not configured or if the no form is entered: min 60 max 3600 Modes TIDP group configuration (config-tidp-grp) History 12.4(6)T 12.4(15)XZ This command was introduced. This command was integrated into Cisco IOS 12.4(15)XZ. Usage Guidelines The controller registers consumers. By default, the controller sends a registration request message once every 60 seconds for up to 1 hour until the consumer is successfully registered. The value entered for the max keyword must be equal to or greater than the value entered for the min keyword. Entering a value of zero after both the min and max keywords configures the controller not to retry registration if the initial registration message receives no response. 35

36 registration retry-interval (TIDP) reauthentication time through rsa-pubkey Examples The following example configures TIDP to attempt to register group members at 30-second intervals for up to 10 minutes or until consumers are registered: Router(config)# tidp group 10 Router(config-tidp-grp)# key-set KEY_1 Router(config-tidp-grp)# registration retry-interval min 30 max 600 Router(config-tidp-grp)# peer Router(config-tidp-grp)# peer Router(config-tidp-grp)# peer Router(config-tidp-grp)# active Related s active key-set peer tidp group Activates a TIDP group. Configures a key set for a TIDP group. Configures a consumer as a member of a TIDP group. Configures a TIDP group. 36

37 reauthentication time through rsa-pubkey rekey address ipv4 rekey address ipv4 To specify the source or destination information of the rekey message, use the rekey address ipv4 command in GDOI local server configuration mode. To remove a source or destination address, use the no form of this command. rekey address ipv4 {access-list-number access-list-name} no rekey address ipv4 {access-list-number access-list-name} Syntax access-list-number access-list-name IP access list number. The number can be from 100 through 199, or it can be in the expanded range of 2000 through Access list name. Default None Modes GDOI local server configuration History 12.4(6)T This command was introduced. Usage Guidelines If rekeys are not required, this command is optional. If rekeys are required, this command is required. The source is usually the key server interface from which the message leaves, and the destination is the multicast address on which the group members receive the rekeys (for example, access-list 101 permit 121 permit udp host eq 848 host eq 848). Examples The following example shows that the rekey address is access list 101 : rekey address ipv4 101 The following example shows that a rekey message is to be sent to access control list (ACL) address : crypto gdoi group gdoigroup1 identity number 1111 server local rekey address ipv4 120 rekey lifetime seconds 400 no rekey retransmit rekey authentication mypubkey rsa ipseca-3845b.examplecompany.com 37

38 rekey address ipv4 reauthentication time through rsa-pubkey access-list 120 permit udp host eq 848 host eq 848 Related s crypto gdoi group server local Identifies a GDOI group and enters GDOI group configuration mode. Designates a device as a GDOI key server and enters GDOI local server configuration. 38

39 reauthentication time through rsa-pubkey rekey algorithm rekey algorithm To define the type of encryption algorithm used for a Group Domain of Interpretation (GDOI) group, use the rekey algorithm command in GDOI local server configuration mode. To disable an algorithm that was defined, use the no form of this command. rekey algorithm type-of-encryption-algorithm no rekey algorithm type-of-encryption-algorithm Syntax type-of-encryption-algorithm Type of encryption algorithm used (see the table below). The default algorithm is 3des-cbc. The rekey algorithm is used to encrypt the rekey message that is sent from the key server to the multicast group. Default If this command is not configured, the default value of 3des-cbc takes effect. However, the default is used only if the commands required for a rekey to occur are specified (see the Note below in Usage Guidelines ). Modes GDOI local server configuration History 12.4(6)T This command was introduced. Usage Guidelines Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. The table below lists the types of encryption algorithms that may be used. Table 2: Types of Encryption Encryption Type 3des-cbc Cipher Block Chaining mode of the Triple Data Encryption Standard (3des). 39

40 rekey algorithm reauthentication time through rsa-pubkey Encryption Type aes 128 aes 192 aes 256 des-cbc 128-bit Advanced Encrytion Standard (AES). 192-bit AES. 256-bit AES. Cipher Block Chaining mode of the Data Encryption Standard (des). At a minimum, the following commands are required for a rekey to occur: rekey address ipv4 {access-list-number access-list-name} rekey authentication {mypubkey pubkey} {rsa key-name} If the rekey algorithm command is not configured, the default of 3des-cbc is used if the above minimum rekey configuration is met. Examples The following example shows that the 3des-cbc encryption standard is used: rekey algorithm 3des-cbc Related s crypto gdoi group rekey address ipv4 rekey authentication server local Identifies a GDOI group and enters GDOI group configuration mode. Specifies the source or destination information of the rekey message. Specifies the keys to be used to a rekey to GDOI group members. Designates a device as a GDOI key server and enters GDOI local server configuration mode. 40

41 reauthentication time through rsa-pubkey rekey authentication rekey authentication To specify the keys to be used for a rekey to Group Domain of Interpretation (GDOI) group members, use the rekey authenticationcommand in GDOI local server configuration mode. To disable the keys, use the no form of this command. rekey authentication {mypubkey pubkey} rsa key-name no rekey authentication {mypubkey pubkey} rsa key-name Syntax mypubkey pubkey rsa key-name Keypair associated with this device. Public key associated with a different device. Identifies an Rivest, Shamir, and Adelman (RSA) keypair. Key to be used for rekey. Default None Modes GDOI local server configuration History 12.4(6)T 12.4(24)T This command was introduced. This command was modified. The pubkey keyword was removed. Usage Guidelines If rekeys are not required, this command is optional. If rekeys are required, this command is required. For this command to work, Rivest, Shamir, and Adelman (RSA) keys must be generated first on the router using the following command: crypto key generate rsa {general keys} [label key-label] For example: crypto key generate rsa general keys label group_1234_key_name Examples The following example shows that the keypair to be used for a rekey is RSA group_1234_key_name : rekey authentication mypubkey rsa group_1234_key_name 41

42 rekey authentication reauthentication time through rsa-pubkey Related s crypto gdoi group crypto key generate rsa server local Identifies a GDOI group and enters GDOI group configuration mode. Generates RSA key pairs. Designates a device as a GDOI key server and enters GDOI local server configuration. 42

43 reauthentication time through rsa-pubkey rekey lifetime rekey lifetime To limit the number of days or seconds for which any one key encryption key (KEK) should be used, use the rekey lifetime command in GDOI local server configuration mode. To disable the number of days or seconds that were set, use the no form of this command. rekey lifetime {days number-of-days seconds number-of-seconds} no rekey lifetime {days seconds} Syntax number-of-days number-of-seconds Lifetime in days. The range is 1 to 30. Lifetime in seconds. The range is 300 to Default 1 day (86400 seconds). Modes GDOI local server configuration (gdoi-local-server) History 12.4(6)T Cisco IOS XE (2)T Cisco IOS XE 3.9S This command was introduced. This command was integrated into Cisco IOS XE 2.3. This command was modified. The days number-of-days keyword and argument pair was added, and the maximum value for the seconds number-of-seconds keyword and argument pair was extended from seconds to seconds. This command was integrated into Cisco IOS XE 3.9S. Usage Guidelines When the rekey lifetime is reached, a new KEK is sent to the group members so that the next rekey is encrypted with the new KEK. Examples The following example shows how to set the rekey lifetime to 600 seconds: Device> enable Device# configure terminal Device(config)# crypto gdoi group GETVPN Device(config-gdoi-group)# identity number 3333 Device(config-gdoi-group)# server local Device(gdoi-local-server)# rekey lifetime seconds 600 Device(gdoi-local-server)# end 43

44 rekey lifetime reauthentication time through rsa-pubkey Related s crypto gdoi group server local Creates or identifies a GDOI group and enters GDOI group configuration mode. Designates a device as a GDOI key server and enters GDOI local server configuration mode. 44

45 reauthentication time through rsa-pubkey rekey retransmit rekey retransmit To specify the duration of a rekey message retransmission and the number of retransmissions, use the rekey retransmit command in GDOI local server configuration mode. To disable the duration and number that were specified, use the no form of this command. rekey retransmit number-of-seconds {number number-of-retransmissions periodic} no rekey retransmit Syntax number-of-seconds periodic Number of seconds that the rekey message is retransmitted. The range is 10 to 60. Periodically sends retransmit rekeys. Default 10 seconds and 2 transmissions. Modes GDOI local server configuration (gdoi-local-server) History 12.4(6)T Cisco IOS XE (2)T Cisco IOS XE 3.9S This command was introduced. This command was integrated into Cisco IOS XE 2.3. This command was modified. The periodic keyword was added. This command was integrated into Cisco IOS XE 3.9S. Usage Guidelines Use this command if you are concerned about network loss. The periodic keyword sends periodic reminder rekeys to group members (GMs) that did not respond with an acknowledgment in the last scheduled rekey. Combining this keyword with the long SA lifetime feature makes a KS effectively synchronize GMs in case they miss a scheduled rekey before the keys roll over. Each periodic rekey increments the sequence number, just as for rekey retransmissions. Also, the GM is removed from the GM database on the key server (KS) after three scheduled rekeys (not retransmissions) for which the GM does not send an acknowledgment. 45

46 rekey retransmit reauthentication time through rsa-pubkey Examples The following example shows how to specify that the rekey message is retransmitted three times for 15 seconds each time: Device> enable Device# configure terminal Device(config)# crypto gdoi group GETVPN Device(config-gdoi-group)# identity number 3333 Device(config-gdoi-group)# server local Device(gdoi-local-server)# rekey retransmit 15 number 3 Device(gdoi-local-server)# end Examples The following example shows how to specify that the rekey message is retransmitted periodically for 30 seconds each time: Device> enable Device# configure terminal Device(config)# crypto gdoi group GROUP-GDOI Device(config-gdoi-group)# identity number 4444 Device(config-gdoi-group)# server local Device(gdoi-local-server)# rekey retransmit 30 periodic Device(gdoi-local-server)# end Related s crypto gdoi group server local Creates or identifies a GDOI group and enters GDOI group configuration mode. Designates a device as a GDOI key server and enters GDOI local server configuration mode. 46

47 reauthentication time through rsa-pubkey rekey sig-hash algorithm rekey sig-hash algorithm To configure the signature hash algorithm for a key encryption key (KEK), use the rekey sig-hash algorithm command in GDOI local server configuration mode. To return a signature hash algorithm to the default (SHA-1), use the no form of this command. rekey sig-hash algorithm algorithm no rekey sig-hash algorithm Syntax algorithm Signature hash algorithm. You can specify sha (for SHA-1), sha256, sha384, or sha512. Default SHA-1 Modes GDOI local server configuration (gdoi-local-server) History 15.2(4)M This command was introduced. Usage Guidelines Using SHA-1 guarantees interoperability with group members (GMs) that are running earlier versions of Cisco IOS software. Suite B requires SHA-256, SHA-384, or SHA-512. Examples The following example shows how to configure the signature hash algorithm to use SHA-512: Device# crypto gdoi group GETVPN Device(config-gdoi-group) server local Device(gdoi-local-server) rekey sig-hash algorithm sha512 Related s rekey algorithm Defines the type of encryption algorithm used for a GDOI group. 47

48 rekey transport unicast reauthentication time through rsa-pubkey rekey transport unicast To configure unicast delivery of rekey messages to group members, use the rekey transport unicastcommand in global configuration mode. To remove unicast delivery of rekey messages and enable the default to multicast rekeying, use the no form of this command. rekey transport unicast no rekey transport unicast Syntax This command has no arguments or keywords. Default If rekey transport unicast is not specified or no rekey transport unicast is specified, multicast rekeying is the default. Modes Global configuration (config) History 12.4(11)T Cisco IOS XE 2.3 This command was introduced. This command was implemented on the Cisco ASR 1000 series routers. Usage Guidelines This command is configured on the key server under the server local command, along with other rekey configurations. Examples The following example shows that unicast delivery of rekey messages to group members has been configured: crypto gdoi group diffint identity number 3333 server local rekey lifetime seconds 300 rekey retransmit 10 number 2 rekey authentication mypubkey rsa mykeys rekey transport unicast sa ipsec 1 profile gdoi-p match address ipv4 120 replay counter window-size 64 address ipv

49 reauthentication time through rsa-pubkey rekey transport unicast Related s address ipv4 server local Sets the source address, which is used as the source for packets originated by the local key server. Designates a device as a GDOI key server and enters GDOI local server configuration mode. 49

50 remark reauthentication time through rsa-pubkey remark To write a helpful comment (remark) for an entry in a named IP access list, use the remark command in access list configuration mode. To remove the remark, use the no form of this command. remark remark no remark remark Syntax remark Comment that describes the access-list entry, up to 100 characters long. Default The access-list entries have no remarks. Modes Standard named or extended named access list configuration History 12.0(2)T 12.2(33)SRA 12.2SX This command was introduced. This command was integrated into Cisco IOS 12.2(33)SRA. This command is supported in the Cisco IOS 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Usage Guidelines The remark can be up to 100 characters long; anything longer is truncated. If you want to write a comment about an entry in a numbered IP access list, use the access-list remark command. Examples In the following example, the host1 subnet is not allowed to use outbound Telnet: ip access-list extended telnetting remark Do not allow host1 subnet to telnet out deny tcp host any eq telnet Related s access-list remark Specifies a helpful comment (remark) for an entry in a numbered IP access list. 50

51 reauthentication time through rsa-pubkey remark deny (IP) ip access-list permit (IP) Sets conditions under which a packet does not pass a named IP access list. Defines an IP access list by name. Sets conditions under which a packet passes a named IP access list. 51

52 remark (IPv6) reauthentication time through rsa-pubkey remark (IPv6) To write a helpful comment (remark) for an entry in an IPv6 access list, use the remarkcommand in IPv6 access list configuration mode. To remove the remark, use the no form of this command. remark text-string no remark text-string Syntax text-string Comment that describes the access list entry, up to 100 characters long. Default IPv6 access list entries have no remarks. Modes IPv6 access list configuration History 12.0(23)S 12.2(13)T 12.2(14)S 12.2(28)SB 12.2(33)SRA 12.2(33)SXH This command was introduced. This command was integrated into Cisco IOS 12.2(13)T. This command was integrated into Cisco IOS 12.2(14)S. This command was integrated into Cisco IOS 12.2(28)SB. This command was integrated into Cisco IOS 12.2(33)SRA. This command was integrated into Cisco IOS 12.2(33)SXH. Usage Guidelines The remark (IPv6) command is similar to the remark (IP) command, except that it is IPv6-specific. The remark can be up to 100 characters long; anything longer is truncated. Examples The following example configures a remark for the IPv6 access list named TELNETTING. The remark is specific to not letting the Marketing subnet use outbound Telnet. ipv6 access-list TELNETTING remark Do not allow Marketing subnet to telnet out deny tcp 2001:0DB8:0300:0201::/64 any eq telnet 52

53 reauthentication time through rsa-pubkey remark (IPv6) Related s ipv6 access-list show ipv6 access-list Defines an IPv6 access list and enters IPv6 access list configuration mode. Displays the contents of all current IPv6 access lists. 53

54 replay counter window-size reauthentication time through rsa-pubkey replay counter window-size To turn on counter-based anti-replay protection for traffic defined inside an access list using Group Domain of Interpretation (GDOI) if there are only two group members in a group, use the replay counter window-sizecommand in GDOI SA IPsec configuration mode. To disable counter-based anti-replay protection, use the no form of this command. replay counter window-size [ number ] no replay counter window-size Syntax number Size of the Sychronous Anti-Replay (SAR) clock window expressed in bytes. Values are equal to 64, 128, 256, 512, and 1024 bytes. Default window size is 64 bytes. Default Counter-based anti-replay is not enabled. Modes GDOI SA IPsec configuration (gdoi-sa-ipsec) History 12.4(11)T Cisco IOS XE 2.3 This command was introduced. This command was implemented on the Cisco ASR 1000 series routers. Usage Guidelines This command is configured on the key server. Cisco IPsec authentication provides anti-replay protection against an attacker duplicating encrypted packets by assigning a unique sequence number to each encrypted packet. (Security association [SA] anti-replay is a security service in which the receiver can reject old or duplicate packets to protect itself against replay attacks.) The decryptor checks off the sequence numbers that it has seen before. The encryptor assigns sequence numbers in an increasing order. The decryptor remembers the value X of the highest sequence number that it has already seen. N is the window size in bytes, and the decryptor also remembers whether it has seen packets having sequence numbers from X-N+1 through X. Any packet with the sequence number X-N is discarded. Currently, N is set at 64, so only 64 packets can be tracked by the decryptor. At times, however, the 64-packet window size is not sufficient. For example, Cisco quality of service (QoS) gives priority to high-priority packets, which could cause some low-priority packets to be discarded even though they could be one of the last 64 packets received by the decryptor. The IPsec Anti-Replay Window: Expanding and Disabling feature allows you to expand the window size, allowing the decryptor to keep track of more than 64 packets. 54

55 reauthentication time through rsa-pubkey replay counter window-size Increasing the anti-replay window size has no impact on throughput and security. The impact on memory is insignificant because only an extra 128 bytes per incoming IPsec SA is needed to store the sequence number on the decryptor. It is recommended that you use the full 1024 window size to eliminate any future anti-replay problems. Note GDOI anti-replay can be either counter based or time based. Use this command for counter-based anti-replay protection. For time-based anti-replay protection, use the replay time window-size command. Examples The following example shows that the anti-replay window size for unicast traffic has been set to 512: crypto gdoi group gdoigroup1 identity number 1111 server local rekey address ipv4 120 rekey lifetime seconds 400 no rekey retransmit rekey authentication mypubkey rsa ipseca-3845b.examplecompany.com sa ipsec 10 profile group1111 match address ipv4 101 replay counter window-size 512 Related s replay time window-size sa ipsec Sets the the window size for anti-replay protection using GDOI if there are more than two group members in a group. Specifies the IPsec SA policy information to be used for a GDOI group and enters GDOI SA IPsec configuration mode. 55

56 replay time window-size reauthentication time through rsa-pubkey replay time window-size To set the window size for anti-replay protection using Group Domain of Interpretation (GDOI) if there are more than two group members in a group, use the replay time window-sizecommand in GDOI SA IPsec configuration mode. To disable time-based anti-replay, use the no form of this command. replay time window-size seconds no replay time window-size Syntax seconds Number of seconds of the interval duration of the Sychronous Anti-Replay (SAR) clock. The value range is 1 through 100. The default value is 100. Default Time-based anti-replay is not enabled. Modes GDOI SA IPsec configuration (gdoi-sa-ipsec) History 12.4(11)T Cisco IOS XE 2.3 This command was introduced. This command was implemented on the Cisco ASR 1000 series routers. Usage Guidelines This command is configured on the key server. Note GDOI anti-replay can be either counter based or time based. This command turns on time-based anti-replay. For counter-based anti-replay protection, use the replay counter window-size command. Examples The following example shows that the number of seconds of the interval duration of the SAR clock has been set to 1: sa ipsec 10 profile group1111 match address ipv4 101 replay time window-size 1 56

57 reauthentication time through rsa-pubkey replay time window-size Related s replay counter window-size sa ipsec Sets the window size for counter-based anti-replay protection for unicast traffic defined inside an access list. Specifies the IPsec SA policy information to be used for a GDOI group and enters GDOI SA IPsec configuration mode. 57

58 request-method reauthentication time through rsa-pubkey request-method To permit or deny HTTP traffic according to either the request methods or the extension methods, use the request-methodcommand in appfw-policy-http configuration mode. To disable this inspection parameter, use the no form of this command. request-method {rfc rfc-method extension extension-method} action {reset allow} [alarm] no request-method {rfc rfc-method extension extension-method} action {reset allow} [alarm] Syntax rfc rfc-method extension extension-method action reset allow alarm Specifies that the supported methods of RFC 2616, Hypertext Transfer Protocol--HTTP/1.1, are to be used for traffic inspection. Any one of the following RFC 2616 methods can be specified: connect, default, delete, get, head, options, post, put, trace. Specifies that the extension methods are to be used for traffic inspection. Any one of the following extension methods can be specified: copy, default, edit, getattribute, getproperties, index, lock, mkdir, move, revadd, revlabel, revlog, save, setattribute, startrev, stoprev, unedit, unlock. Methods and extension methods outside of the specified method are subject to the specified action (reset or allow). Sends a TCP reset notification to the client or server if the HTTP message fails the mode inspection. Forwards the packet through the firewall. (Optional) Generates system logging (syslog) messages for the given action. Default If a given method is not specified, all methods and extension methods are supported with the reset alarm action. Modes appfw-policy-http configuration 58

59 reauthentication time through rsa-pubkey request-method History 12.3(14)T This command was introduced. Usage Guidelines Only methods configured by the request-method command are allowed thorough the firewall; all other HTTP traffic is subjected to the specified action (reset or allow). Examples The following example shows how to define the HTTP application firewall policy mypolicy. This policy includes all supported HTTP policy rules. After the policy is defined, it is applied to the inspection rule firewall, which will inspect all HTTP traffic entering the FastEthernet0/0 interface.! Define the HTTP policy. appfw policy-name mypolicy application http strict-http action allow alarm content-length maximum 1 action allow alarm content-type-verification match-req-rsp action allow alarm max-header-length request 1 response 1 action allow alarm max-uri-length 1 action allow alarm port-misuse default action allow alarm request-method rfc default action allow alarm request-method extension default action allow alarm transfer-encoding type default action allow alarm!!! Apply the policy to an inspection rule. ip inspect name firewall appfw mypolicy ip inspect name firewall http!!! Apply the inspection rule to all HTTP traffic entering the FastEthernet0/0 interface. interface FastEthernet0/0 ip inspect firewall in!! 59

60 request-queue (GTP) reauthentication time through rsa-pubkey request-queue (GTP) To specify the number of General Packet Radio Service (GPRS) Tunneling Protocol (GTP) requests that can be queued to wait for a response, use the request-queue command in parameter-map type inspect configuration mode. To remove the specified number of GTP requests queued, use the no form of this command. request-queue max-requests no request-queue Syntax max-requests Maximum number of GTP requests that are queued to wait for a response. Valid values are from 1 to The default is 200. Default By default, 200 GTP requests are queued to wait for a response. Modes Parameter-map type inspect configuration (config-profile) History Cisco IOS XE 3.7S This command was introduced. Usage Guidelines The request-queue command specifies the maximum number of GTP requests that can be queued to wait for a response. When the specified maximum limit is reached and a new request arrives, the request that has been in the queue for the longest time is removed. The Error Indication, Version Not Supported, and Serving GPRS Support Node (SGSN) Context Acknowledge messages are considered as requests and these messages will not be part of the request queue. Examples The following example shows how to configure the GTP request queue size as 2345: Device(config)# parameter-map type inspect-global gtp Device(config-profile)# request-queue 2345 Device(config-profile)# Related s parameter-map type inspect-global Configures a global parameter map and enters parameter-map type inspect configuration mode. 60

61 reauthentication time through rsa-pubkey request-timeout request-timeout To set the number of seconds before an authentication request times out, use the request-timeoutcommand in webvpn sso server configuration mode. request-timeout number-of-seconds no request-timeout number-of-seconds Syntax number-of-seconds Number of seconds. Value = 10 through 30. Default = 15. Default None Modes Webvpn sso server configuration History 12.4(11)T This command was introduced. Usage Guidelines This command is useful for networks that are congested and tend to have losses. Corporate networks are generally not affected by congestion or losses. Examples The following example shows that the number of seconds before an authentication request times out is 25: webvpn context context1 sso-server test-sso-server request-timeout 25 Related s webvpn context Enters webvpn context configuration mode to configure the SSL VPN context. 61

62 reset (policy-map) reauthentication time through rsa-pubkey reset (policy-map) To reset an SMTP connection with an SMTP sender (client) if it violates the specified policy, use the reset command in policy-map configuration mode. This action sends an error code to the sender and closes the connection gracefully. reset Default No default behavior or values. Modes Policy-map configuration History 12.4(20)T This command was introduced in Cisco IOS 12.4(20)T. Examples The following example displays the reset command configuration for DSP 1: Router(config)# policy-map type inspect smtp p1 Router(config-pmap)# class type inspect smtp c1 Router(config-pmap)# reset 62

63 reauthentication time through rsa-pubkey reset (zone-based policy) reset (zone-based policy) To reset a TCP connection if the data length of the Simple Mail Transfer Protocol (SMTP) body exceeds the value that you configured in the class-map type inspect smtpcommand, use the reset command in policy-map configuration mode. reset Syntax This command has no arguments or keywords. Default The TCP connection is not reset. Modes Policy-map configuration History 12.4(6)T This command was introduced. Usage Guidelines You can use this command only after entering the policy-map type inspect, class type inspect, and parameter-map type inspect commands. You can enter reset only for TCP traffic. Examples The following example creates a Layer 7 SMTP policy map named mysmtp-policy and applies the reset action to each of the match criteria: policy-map type inspect smtp mysmtp-policy class-map type inspect smtp hug s reset Related s class type inspect parameter-map type inspect policy-map type inspect Specifies the traffic (class) on which an action is to be performed. Configures an inspect type parameter map for connecting thresholds, timeouts, and other parameters pertaining to the inspect action. Creates Layer 3 and Layer 4 inspect type policy maps. 63

64 responder-only reauthentication time through rsa-pubkey responder-only To configure a device as responder-only, use the responder-onlycommand in IPsec profile configuration mode. To remove the responder-only setting, use the no form of this command. responder-only no responder-only Syntax This command has no arguments or keywords. Default A device is not configured as responder-only. Modes IPsec profile configuration (ipsec-profile) History 12.4(24)T This command was introduced. Usage Guidelines Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. This command is relevant only for a virtual interface scenario and is configurable only under an IPsec profile. Neither static nor crypto maps are supported. Examples The following example shows that the device has been configured as a responder-only: crypto ipsec profile vti set transform-set 3dessha set isakmp-profile clients responder-only Related s crypto ipsec profile Defines the IPsec parameters that are to be used for IPsec encryption between two IPsec routers and enters IPsec profile configuration mode. 64

65 reauthentication time through rsa-pubkey retired (IPS) retired (IPS) specify whether or not a retired signature or signature category definition should be saved in the router memory, use the retiredcommand in signature-definition-status (config-sigdef-status) or IPS-category-action (config-ips-category-action) configuration mode. To return to the default action, use the no form of this command. retired {true false} no retired Syntax true false Retires all signatures within a given category. Unretires all signatures within a given category. Default Signature or signature category definitions are not saved in the system. Modes Signature-definition-status configuration (config-sigdef-status) IPS-category-action configuration (config-ips-category-action) History 12.4(11)T This command was introduced. Usage Guidelines Router memory and resource constraints prevent a router from loading all Cisco IOS IPS signatures. Thus, it is recommended that you load only a selected set of signatures that are defined by the categories. Because the categories are applied in a top-down order, you should first retire all signatures, followed by unretiring specific categories. Retiring signatures enables the router to load information for all signatures, but the router will not build the parallel scanning data structure. Retired signatures are not scanned by Cisco IOS IPS, so they will not fire alarms. If a signature is irrelevant to your network or if you want to save router memory, you should retire signatures, as appropriate. Examples The following example shows how to retire all signatures and configure the Basic ios_ips category: Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# ip ips signature category Router(config-ips-category)# category all Router(config-ips-category-action)# retired true Router(config-ips-category-action)# exit Router(config-ips-category)# category ios_ips basic Router(config-ips-category-action)# retired false 65

66 retired (IPS) reauthentication time through rsa-pubkey Router(config-ips-category-action)# exit Router(config-ips-category)# exit Do you want to accept these changes? [confirm]y Related s enabled signature status Changes the enabled status of a given signature or signature category. Specifies a signature for which the CLI user tunings will be changed. Enters the signature-definition-status configuration mode, which allows you to change the enabled or retired status of an individual signature. 66

67 reauthentication time through rsa-pubkey retransmit (config-radius-server) retransmit (config-radius-server) To specify the number of times a RADIUS request is re-sent to a server when that server is not responding or responding slowly, use the retransmit command in RADIUS server configuration mode. To restore the default value, use the no form of this command. retransmit retries no retransmit Syntax retries Maximum number of retransmission attempts. The range is from 0 to 100. The default is 3. Default The default number of retransmission attempts is 3. Modes RADIUS server configuration (config-radius-server) History 15.2(2)T This command was introduced. Usage Guidelines The Cisco IOS software tries all servers, allowing each one to time out before increasing the retransmit count. If the RADIUS server is only a few hops from the router, it is recommended that you configure the RADIUS server retransmit rate to 5. Examples The following example shows how to specify a retransmit counter value of five times: Device(config)# aaa new-model Device(config)# radius server myserver Device(config-radius-server)# address ipv Device(config-radius-server)# retransmit 5 Related s aaa new-model address ipv4 Enables the AAA access control model. Configures the IPv4 address for the RADIUS server accounting and authentication parameters. 67

68 retransmit (config-radius-server) reauthentication time through rsa-pubkey radius server Specifies the name for the RADIUS server configuration and enters RADIUS server configuration mode. 68

69 reauthentication time through rsa-pubkey reverse-route reverse-route To create source proxy information for a crypto map entry, use the reverse-route command in crypto map configuration mode. To remove the source proxy information from a crypto map entry, use the no form of this command. Effective with Cisco IOS 12.4(15)T reverse-route [static remote-peer ip-address [gateway] [static]] no reverse-route [static remote-peer ip-address [gateway] [static]] Before Cisco IOS 12.4(15)T reverse-route [static tag tag-id [static] remote-peer [static] remote-peer ip-address [static]] no reverse-route [static tag tag-id [static] remote-peer [static] remote-peer ip-address [static]] Syntax tag tag-id remote-peer ip-address gateway (Optional) Tag value that can be used as a match value for controlling redistribution via route maps. Note Effective with Cisco IOS 12.4(15)T, the tag keyword and tag-id argument were removed. (Optional) Indicates two routes: one for the tunnel endpoint, with the next hop being the interface to which the crypto map is bound. Note The remote-peer keyword and its variants (ip-address argument and gateway keyword) are applicable only to crypto maps. (Optional) If this argument is used without the optional gateway keyword, there is only one route: the protected subnet. The next hop is determined by the user-added value for the ip-address argument. (Optional) Used with the ip-address argument. If the gateway keyword is used, there are two routes: one to the protected subnet through the remote-tunnel endpoint and the other to the remote-tunnel endpoint that is determined by the user-added value for the ip-address argument. Note The optional gateway keyword enables the behavior of the reverse-route remote-peer ip-address command syntax used for software releases before Cisco IOS 12.3(14)T. 69

70 reverse-route reauthentication time through rsa-pubkey static (Optional) Creates routes on the basis of crypto ACLs, regardless of whether flows have been created for these ACLs. Default No default behavior or values. Modes Crypto map configuration (config-crypto-map) History 12.1(9)E 12.2(8)T 12.2(11)T 12.2(9)YE 12.2(14)S 12.2(13)T 12.3(14)T 12.2(33)SRA 12.4(15)T 12.2SX This command was introduced. This command was integrated into Cisco IOS 12.2(8)T. This command was implemented on the Cisco AS5300 and Cisco AS5800 platforms. This command was integrated into Cisco IOS 12.2(9)YE. This feature was integrated into Cisco IOS 12.2(14)S. The remote-peer keyword and ip-address argument were added. The static and tag keywords and tag-id argument were added. This command was integrated into Cisco IOS 12.2(33)SRA. The tag keyword and tag-id argument were deleted. The gateway keyword was added. This command is supported in the Cisco IOS 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Usage Guidelines Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. This command can be applied on a per-crypto map basis. Reverse route injection (RRI) provides a scalable mechanism to dynamically learn and advertise the IP address and subnets that belong to a remote site that connects through an IPsec VPN tunnel. 70

71 reauthentication time through rsa-pubkey reverse-route When enabled in an IPSec crypto map, RRI will learn all the subnets from any network that is defined in the crypto ACL as the destination network. The learned routes are installed into the local routing table as static routes that point to the encrypted interface. When the IPsec tunnel is torn down, the associated static routes will be removed. These static routes may then be redistributed into other dynamic routing protocols so that they can be advertised to other parts of the network (usually done by redistributing RRI routes into dynamic routing protocols on the core side). The remote-peer keyword is required when RRI is performed in a VRF-Aware IPsec scenario. Examples Examples The following example shows how to configure RRI when crypto ACLs exist. The example shows that all remote VPN gateways connect to the router via RRI is added on the static crypto map, which creates routes on the basis of the source network and source netmask that are defined in the crypto ACL. crypto map mymap 1 ipsec-isakmp set peer reverse-route set transform-set esp-3des-sha match address 102 Interface FastEthernet 0/0 ip address standby name group1 standby ip crypto map mymap redundancy group1 access-list 102 permit ip Note In Cisco IOS 12.3(14)T and later releases, for the static map to retain this same behavior of creating routes on the basis of crypto ACL content, the static keyword will be necessary, that is, reverse-route static. The reverse-route command in this situation creates routes that are analogous to the following static route CLI (ip route): Remote Tunnel Endpoint ip route VPN Services Module (VPNSM) ip route vlan0.1 In the following example, two routes are created, one for the remote endpoint and one for route recursion to the remote endpoint via the interface on which the crypto map is configured. reverse-route remote-peer Examples The following configuration example shows how to configure RRI for a situation in which there are existing ACLs: crypto map mymap 1 ipsec-isakmp set peer reverse-route static set transform-set esp-3des-sha 71

72 reverse-route reauthentication time through rsa-pubkey match address 101 access-list 101 permit ip The following example shows how RRI-created routes can be tagged with a tag number and then used by a routing process to redistribute those tagged routes via a route map: crypto dynamic-map ospf-clients 1 reverse-route tag 5 router ospf 109 redistribute rip route-map rip-to-ospf route-map rip-to-ospf permit match tag 5 set metric 5 set metric-type type1 Device# show ip ospf topology P /29, 1 successors, FD is , tag is 5 via ( / ), FastEthernet0/1 The following example shows that one route has been created to the remote proxy via a user-defined next hop. This next hop should not require a recursive route lookup unless it will recurse to a default route. reverse-route remote-peer The previous example yields the following before Cisco IOS 12.3(14)T: /24 via (in the VRF table if VRFs are configured) /32 via (in the global route table) And this result occurs with RRI enhancements: /24 via (in the VRF table if VRFs are configured, otherwise in the global table) Examples In the following example, routes are created from the destination information in the access control list (ACL). One route will list as the next-hop route to the ACL information, and one will indicate that to get to , the route will have to go via All routes will have a metric of 10. Routes are created only at the time the map and specific ACL rule are created. crypto map map1 1 ipsec-isakmp set peer reverse-route remote-peer gateway set reverse-route distance 10 match address 101 Configuring RRI with Route Tags 12.4(15)T or later: Example The following example shows how RRI-created routes can be tagged with a tag number and then used by a routing process to redistribute those tagged routes via a route map: crypto dynamic-map ospf-clients 1 set reverse-route tag 5 router ospf 109 redistribute rip route-map rip-to-ospf route-map rip-to-ospf permit match tag 5 set metric 5 set metric-type type1 Device# show ip ospf topology P /29, 1 successors, FD is , tag is 5 via ( / ), FastEthernet0/1 72

73 reauthentication time through rsa-pubkey reverse-route Related s crypto map (global IPSec) crypto map local-address show crypto map (IPSec) Creates or modifies a crypto map entry and enters the crypto map configuration mode. Specifies and names an identifying interface to be used by the crypto map for IPsec traffic. Displays the crypto map configuration. 73

74 revocation-check reauthentication time through rsa-pubkey revocation-check To check the revocation status of a certificate, use the revocation-check command in ca-trustpoint configuration mode. To disable this functionality, use the no form of this command. revocation-check method1 [method2 method3] no revocation-check method1 [method2 method3] Syntax method1 [method2 method3] Method used by the device to check the revocation status of the certificate. Available methods are as follows: crl Certificate checking is performed by a certificate revocation list (CRL). This is the default behavior. none Certificate checking is not required. ocsp Certificate checking is performed by an online certificate status protocol (OCSP) server. If a second and third method are specified, each method will be used only if the previous method returns an error, such as a server being down. Default After a trustpoint is enabled, the default is set to revocation-check crl, which means that CRL checking is mandatory. Modes Ca-trustpoint configuration (ca-trustpoint) History 12.3(2)T 12.2(33)SRA 12.2SX 12.4(24)T This command was introduced. This command replaced the crl best-effort and crl optional commands. This command was integrated into Cisco IOS release 12.(33)SRA. This command is supported in the Cisco IOS 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Support for IPv6 Secure Neighbor Discovery (SeND) was added. 74

75 reauthentication time through rsa-pubkey revocation-check Usage Guidelines Use therevocation-check command to specify at least one method that is to be used to ensure that the certificate of a peer has not been revoked. If your device does not have the applicable CRL and is unable to obtain one or if the OCSP server returns an error, your device will reject the peer s certificate unless you include the none keyword in your configuration. If the none keyword is configured, a revocation check will not be performed and the certificate will always be accepted. If the revocation-check none command is configured, you cannot manually download the CRL via the crypto pki crl request command because the manually downloaded CRL may not be deleted after it expires. The expired CRL can cause all certificate verifications to be denied. Your device will process a CRL in the Distinguished Encoding Rules (DER) format only. Revocation check will fail and will be rejected if the CRL is in any other format, such as, Privacy Enhanced Mail (PEM) format. Note The none keyword replaces the optional keyword that is available from the crl command. If you enter the crl optional command, it will be written back as the revocation-check none command. However, there is a difference between the crl optional command and the revocation-check nonecommand. The crl optional command will perform revocation checks against any applicable in-memory CRL. If a CRL is not available, a CRL will not be downloaded and the certificate is treated as valid; the revocation-check none command ignores the revocation check completely and always treats the certificate as valid. Also, the crl and none keywords issued together replace the best-effort keyword that is available from the crl command. If you enter the crl best-effort command, it will be written back as the revocation-check crl none command. Examples The following example shows how to configure the device to use the OCSP server that is specified in the AIA extension of the certificate: Device(config)# crypto pki trustpoint mytp Device(ca-trustpoint)# revocation-check ocsp The following example shows how to configure the device to download the CRL from the CDP; if the CRL is unavailable, the OCSP server that is specified in the Authority Info Access (AIA) extension of the certificate will be used. If both options fail, certificate verification will also fail. Device(config)# crypto pki trustpoint mytp Device(ca-trustpoint)# revocation-check crl ocsp The following example shows how to configure your device to use the OCSP server at the HTTP URL If the server is down, revocation check will be ignored. Device(config)# crypto pki trustpoint mytp Device(ca-trustpoint)# ocsp url Device(ca-trustpoint)# revocation-check ocsp none Related s crl query crypto pki trustpoint ocsp url Queries the CRL to ensure that the certificate of the peer has not been revoked. Declares the CA that your device should use. Enables an OCSP server. 75

76 revocation-check reauthentication time through rsa-pubkey 76

77 reauthentication time through rsa-pubkey revocation-check (ca-trustpool) revocation-check (ca-trustpool) To disable a revocation checking method when the public key infrastructure (PKI) trustpool policy is being used, use the revocation-check command in ca-trustpool configuration mode. To return to the default, use the no form of this command. revocation-check method1 [method2 method3] no revocation-check method1 [method2 method3] Syntax method1 [method2 method3]] Method used by the router to check the revocation status of the certificate. Available methods are identified by the following keywords: crl--certificate checking is performed by a certificate revocation list (CRL). This is the default behavior. none --Certificate checking is not required. ocsp--certificate checking is performed by an online certificate status protocol (OCSP) server. If a second and third method are specified, each method is used only if the previous method returns an error, such as a server being down. Default CRL checking is mandatory for current trustpoint policy usage. Modes Ca-trustpool configuration (ca-trustpool) History 15.2(2)T 15.1(1)SY This command was introduced. This command was integrated into Cisco IOS 15.1(1)SY. Usage Guidelines Before you can configure this command, you must enable the crypto pki trustpool policy command, which enters ca-trustpool configuration mode. If a revocation policy needs to be altered for specific certificate authority (CA) certificates in the PKI trustpool, use certificate maps instead. 77

78 revocation-check (ca-trustpool) reauthentication time through rsa-pubkey Your device will process a CRL in the Distinguished Encoding Rules (DER) format only. Revocation check will fail and will be rejected if the CRL is in any other format, such as, Privacy Enhanced Mail (PEM) format. Examples The revocation-check command in following example disables both CRL and OCSP revocation checks: Device(config)# crypto pki trustpool policy Device(ca-trustpool)# revocation-check ocsp crl none Related s cabundle url chain-validation crl crypto pki trustpool import crypto pki trustpool policy default match ocsp show show crypto pki trustpool Configures the URL from which the PKI trustpool CA bundle is downloaded. Enables chain validation from the peer's certificate to the root CA certificate in the PKI trustpool. Specifes the CRL query and cache options for the PKI trustpool. Manually imports (downloads) the CA certificate bundle into the PKI trustpool to update or replace the existing CA bundle. Configures PKI trustpool policy parameters. Resets the value of a ca-trustpool configuration subcommand to its default. Enables the use of certificate maps for the PKI trustpool. Specifies OCSP settings for the PKI trustpool. Displays the PKI trustpool policy of the router in ca-trustpool configuration mode. Displays the PKI trustpool certificates of the router and optionally shows the PKI trustpool policy. 78

79 reauthentication time through rsa-pubkey revocation-check (ca-trustpool) source interface storage vrf Specifies the source interface to be used for CRL retrieval, OCSP status, or the downloading of a CA certificate bundle for the PKI trustpool. Specifies a file system location where PKI trustpool certificates are stored on the router. Specifies the VRF instance to be used for CRL retrieval. 79

80 root reauthentication time through rsa-pubkey root To obtain the certification authority (CA) certificate via TFTP, use the root command in ca-trustpoint configuration mode. To deconfigure the CA, use the no form of this command. root tftp server-hostname filename no root tftp server-hostname filename Syntax tftp Defines the TFTP protocol to get the root certificate. server-hostname filename Specifies a name for the server and a name for the file that will store the trustpoint CA. Default A CA certificate is not configured. Modes Ca-trustpoint configuration History 12.2(8)T 12.2(18)SXD 12.2(33)SRA 12.2SX This command was introduced. This command was integrated into Cisco IOS 12.2(18)SXD. This command was integrated into Cisco IOS release 12.(33)SRA. This command is supported in the Cisco IOS 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. Usage Guidelines This command allows you to access the CA via the TFTP protocol, which is used to get the CA. You want to configure a CA certificate so that your router can verify certificates issued to peers. Thus, your router does not have to enroll with the CA that issued the certificates the peers. Before you can configure this command, you must enable the crypto ca trustpointcommand, which puts you in ca-trustpoint configuration mode. 80

81 reauthentication time through rsa-pubkey root Note The crypto ca trustpointcommanddeprecates the crypto ca identityand crypto ca trusted-rootcommands and all related subcommands (all ca-identity and trusted-root configuration mode commands). If you enter a ca-identity or trusted-root subcommand, theconfiguration mode and command will be written back as ca-trustpoint. Examples The following example shows how to configure the CA certificate named bar using TFTP: crypto ca trustpoint bar root tftp xxx fff crl optional Related s crypto ca trustpoint Declares the CA that your router should use. 81

82 root CEP reauthentication time through rsa-pubkey root CEP The crypto ca trustpointcommanddeprecates the crypto ca trusted-rootcommand and all related subcommands (all trusted-root configuration mode commands). If you enter a trusted-root subcommand, theconfiguration mode and command will be written back as ca-trustpoint. 82

83 reauthentication time through rsa-pubkey root PROXY root PROXY The root PROXYcommand is replaced by the enrollment http-proxy command. See the enrollment http-proxycommand for more information. 83

84 root TFTP reauthentication time through rsa-pubkey root TFTP The root TFTPcommand is replaced by the root command. See the rootcommand for more information. 84

85 reauthentication time through rsa-pubkey route accept route accept To filter the routes received from the peer and save the routes on the router based on the specified values, use the route accept command in IKEv2 authorization policy configuration mode. To reject the routes, use the no form of this command. route accept any [tag tag-id] [distance value] no route accept Syntax any tag tag-id distance value Accepts all routes received from the peer. (Optional) Tags the route with the specified ID. The default value is 1. (Optional) Sets the metric of the route with the specified value. The default value is 2. Default The routes received from the peer are not filtered. Modes IKEv2 authorization policy configuration (config-ikev2-author-policy) History 15.2(1)T This command was introduced. Usage Guidelines Before using the route accept command, you must first configure the crypto ikev2 authorization policy command. Examples The following example show how to filter the routes received from the peer and save the routes on the router based on the specified values: Router(config)# crypto ikev2 authorization policy policy1 Router(config-ikev2-profile)# route accept any tag 1 Related s crypto ikev2 authorization policy Specifies an IKEv2 authorization policy. 85

86 route set reauthentication time through rsa-pubkey route set To specify the route set parameters to the peer via configuration mode, use the route set command in IKEv2 authorization policy configuration mode. To disable, use the no form of this command. route set{interface interface access-list{access-list-name access-list-number expanded-access-list-number ipv6 access-list-name}} no route set {interface access-list{access-list-name access-list-number expanded-access-list-number ipv6 access-list-name}} Syntax interface interface access-list access-list-name access-list-number expanded-access-list-number ipv6 Specifies the route interface. Specifies the route access list. Specifies the access list name. Specifies the standard access list number. The range is from 1 to 99. Specifies the expanded access list number. The range is from 1300 to Specifies an IPv6 access list. Default Route set parameters are not set. Modes IKEv2 authorization policy configuration (config-ikev2-author-policy) History 15.2(1)T 15.2(2)T 15.3(3)M This command was introduced. This command replaces the subnet-acl command. This command was modified. The interface argument was added. Usage Guidelines Before using the route set command, you must first configure the crypto ikev2 authorization policy command. This command allows running routing protocols such as BGP over VPN. 86

87 reauthentication time through rsa-pubkey route set Examples The following example show how to send the IP address of the VPN interface to the peer via configuration mode: Router(config)# crypto ikev2 authorization policy policy1 Router(config-ikev2-profile)# route set interface Ethernet Related s crypto ikev2 authorization policy Specifies an IKEv2 authorization policy. 87

88 route set remote reauthentication time through rsa-pubkey route set remote To push route set parameters to be pushed to the remote peer via configuration mode, use the route set remote command in IKEv2 authorization policy configuration mode. To disable, use the no form of this command. route set remote{ipv4ip-address mask ipv6ip-address/mask} no route set remote{ipv4ip-address mask ipv6ip-address/mask} Syntax ipv4 ipv6 ip-address mask Specifies an IPv4 route. Specifies an IPv6 route. The IP address and network mask for the route. Default Route set parameters are not set. Modes IKEv2 authorization policy configuration (config-ikev2-author-policy) History 15.3(3)M This command was introduced. Usage Guidelines Before using the route set remote command, you must first configure the crypto ikev2 authorization policy command. Examples The following example show how to push an IPv4 address to the remote peer via configuration mode: Router(config)# crypto ikev2 authorization policy policy1 Router(config-ikev2-profile)# route set ipv Related s crypto ikev2 authorization policy Specifies an IKEv2 authorization policy. 88

89 reauthentication time through rsa-pubkey router-preference maximum router-preference maximum To verify the advertised default router preference parameter value, use the router-preference maximum command in RA guard policy configuration mode. router-preference maximum {high low medium} Syntax high medium low Default router preference parameter value is higher than the specified limit. Default router preference parameter value is equal to the specified limit. Default router preference parameter value is lower than the specified limit. Default The router preference maximum value is not configured. Modes RA guard policy configuration (config-ra-guard) History 12.2(50)SY 15.2(4)S 15.0(2)SE Cisco IOS XE 3.2SE This command was introduced. This command was integrated into Cisco IOS 15.2(4)S. This command was integrated into Cisco IOS 15.0(2)SE. This command was integrated into Cisco IOS XE 3.2SE. Usage Guidelines The router-preference maximum command enables verification that the advertised default router preference parameter value is lower than or equal to a specified limit. You can use this command to give a lower priority to default routers advertised on trunk ports, and to give precedence to default routers advertised on access ports. The router-preference maximum command limit are high, medium, or low. If, for example, this value is set to medium and the advertised default router preference is set to high in the received packet, then the packet is dropped. If the command option is set to medium or low in the received packet, then the packet is not dropped. 89

90 router-preference maximum reauthentication time through rsa-pubkey Examples The following example shows how the command defines a router advertisement (RA) guard policy name as raguard1, places the router in RA guard policy configuration mode, and configures router-preference maximum verification to be high: Router(config)# ipv6 nd raguard policy raguard1 Router(config-ra-guard)# router-preference maximum high Related s ipv6 nd raguard policy Defines the RA guard policy name and enters RA guard policy configuration mode. 90

91 reauthentication time through rsa-pubkey rsakeypair rsakeypair To specify which Rivest, Shamir, and Adelman (RSA) key pair to associate with the certificate, use the rsakeypair command in ca-trustpoint configuration mode. rsakeypair key-label [key-size [ encryption-key-size ]] Syntax key-label key-size encryption-key-size Name of the key pair, which is generated during enrollment if it does not already exist or if the auto-enroll regenerate command is configured. (Optional) Size of the desired Rivest, Shamir, Adelman (RSA) key pair. If the size is not specified, the existing key size is used. (Optional) Size of the second key, which is used to request separate encryption, signature keys, and certificates. Default The fully qualified domain name (FQDN) key is used. Modes Ca-trustpoint configuration History 12.2(8)T 12.2(18)SXD 12.2(33)SRA 12.4(24)T This command was introduced. This command was integrated into Cisco IOS 12.2(18)SXD. This command was integrated into Cisco IOS 12.(33)SRA. Support for IPv6 Secure Neighbor Discovery (SeND) command was added. Usage Guidelines Note Security threats, as well as the cryptographic technologies to help protect against them, are constantly changing. For more information about the latest Cisco cryptographic recommendations, see the Next Generation Encryption (NGE) white paper. 91

GETVPN CRL Checking. Finding Feature Information. Information About GETVPN CRL Checking

GETVPN CRL Checking. Finding Feature Information. Information About GETVPN CRL Checking During the Group Encrypted Transport VPN (GET VPN) process, certificates are received from a certificate authority (CA) and used as a proof of identity. Certificates may be revoked for a number of reasons,

More information

clear ip access-list counters

clear ip access-list counters clear ip access-list counters clear ip access-list counters To clear IP access list counters, use the clear ip access-list counters command in privileged EXEC mode. clear ip access-list counters [access-list-number

More information

standby arp gratuitous through track vrrp

standby arp gratuitous through track vrrp standby arp gratuitous, page 2 standby authentication, page 4 standby bfd, page 7 standby bfd all-interfaces, page 9 standby delay minimum reload, page 11 standby follow, page 13 standby ip, page 15 standby

More information

database archive through dns

database archive through dns database archive through dns data, page 3 database archive, page 5 database level, page 8 database url, page 12 database username, page 18 deadtime (config-ldap-server), page 21 deadtime (server-group

More information

GET VPN Resiliency. Finding Feature Information. Prerequisites for GET VPN Resiliency

GET VPN Resiliency. Finding Feature Information. Prerequisites for GET VPN Resiliency The feature improves the resiliency of Cisco Group Encrypted Transport (GET) VPN so that data traffic disruption is prevented or minimized when errors occur. Finding Feature Information, page 1 Prerequisites

More information

SSL VPN - IPv6 Support

SSL VPN - IPv6 Support The feature implements support for IPv6 transport over IPv4 SSL VPN session between a client, such as Cisco AnyConnect Mobility Client, and SSL VPN. Finding Feature Information, on page 1 Prerequisites

More information

SSL VPN - IPv6 Support

SSL VPN - IPv6 Support The feature implements support for IPv6 transport over IPv4 SSL VPN session between a client, such as Cisco AnyConnect Mobility Client, and SSL VPN. Finding Feature Information, page 1 Prerequisites for,

More information

Configuring Stateful Interchassis Redundancy

Configuring Stateful Interchassis Redundancy The Stateful Interchassis Redundancy feature enables you to configure pairs of devices to act as backups for each other. This module describes conceptual information about and tasks for configuring stateful

More information

ppp accounting through quit

ppp accounting through quit ppp accounting through quit ppp accounting, page 3 ppp authentication, page 5 ppp authentication ms-chap-v2, page 9 ppp authorization, page 11 ppp chap hostname, page 13 ppp chap password, page 15 ppp

More information

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT The Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT feature supports the forwarding of packets from a standby

More information

Configuring the FlexVPN Server

Configuring the FlexVPN Server This module describes FlexVPN server features, IKEv2 commands required to configure the FlexVPN server, remote access clients, and the supported RADIUS attributes. Note Security threats, as well as cryptographic

More information

ip source-track through ivrf

ip source-track through ivrf ip source-track through ivrf ip source-track, page 5 ip source-track address-limit, page 7 ip source-track export-interval, page 9 ip source-track syslog-interval, page 11 ip ssh, page 13 ip ssh break-string,

More information

Configuring PKI CHAPTER

Configuring PKI CHAPTER CHAPTER 9 This chapter provides information about configuring PKI-related features using the VSPA on the Catalyst 6500 Series switch. It includes the following sections: Overview of PKI, page 9-2 Understanding

More information

Configuring Security for VPNs with IPsec

Configuring Security for VPNs with IPsec This module describes how to configure basic IPsec VPNs. IPsec is a framework of open standards developed by the IETF. It provides security for the transmission of sensitive information over unprotected

More information

NAT Box-to-Box High-Availability Support

NAT Box-to-Box High-Availability Support The feature enables network-wide protection by making an IP network more resilient to potential link and router failures at the Network Address Translation (NAT) border. NAT box-to-box high-availability

More information

Configuring Network Admission Control

Configuring Network Admission Control CHAPTER 59 This chapter describes how to configure Network Admission Control (NAC) in Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see

More information

Zone-Based Policy Firewall High Availability

Zone-Based Policy Firewall High Availability The feature enables you to configure pairs of devices to act as backup for each other. High availability can be configured to determine the active device based on a number of failover conditions. When

More information

Configuring Internet Key Exchange Version 2

Configuring Internet Key Exchange Version 2 This module contains information about and instructions for configuring basic and advanced Internet Key Exchange Version 2 (IKEv2). The tasks and configuration examples for IKEv2 in this module are divided

More information

Configuring Internet Key Exchange Version 2 and FlexVPN Site-to-Site

Configuring Internet Key Exchange Version 2 and FlexVPN Site-to-Site Configuring Internet Key Exchange Version 2 and FlexVPN Site-to-Site This module contains information about and instructions for configuring basic and advanced Internet Key Exchange Version 2 (IKEv2)and

More information

ip dhcp-client network-discovery through ip nat sip-sbc

ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery, page 3 ip dhcp-client update dns, page 5 ip dhcp drop-inform, page 8 ip dhcp-relay information option server-override,

More information

Content Switching Module with SSL Commands

Content Switching Module with SSL Commands CHAPTER 2 This chapter contains an alphabetical listing of the commands necessary to configure the CSM-S. These commands are unique to server load-balancing (SLB) and Layer 3 switching. 2-1 arp Chapter

More information

Cisco IOS First Hop Redundancy Protocols Command Reference

Cisco IOS First Hop Redundancy Protocols Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

no track object-number {decrement value shutdown} Objects and decrement priority per object are not tracked.

no track object-number {decrement value shutdown} Objects and decrement priority per object are not tracked. track (firewall) track (firewall) To configure the redundancy group tracking, use the track command in redundancy application group configuration mode. To remove the redundancy group tracking, use the

More information

This command is removed effective with Cisco IOS Release 12.4(6)T. no eap {username name password password}

This command is removed effective with Cisco IOS Release 12.4(6)T. no eap {username name password password} eap eap Note This command is removed effective with Cisco IOS 12.4(6)T. To specify Extensible Authentication Protocol- (EAP-) specific parameters, use the eap command in identity profile configuration

More information

IP Application Services Commands default (tracking) default {delay object object-number threshold percentage}

IP Application Services Commands default (tracking) default {delay object object-number threshold percentage} default (tracking) default (tracking) To set the default values for a tracked list, use the default command in tracking configuration mode. To disable the defaults, use the no form of this command. default

More information

Configuring Network Admission Control

Configuring Network Admission Control 45 CHAPTER This chapter describes how to configure Network Admission Control (NAC) on Catalyst 6500 series switches. With a PFC3, Release 12.2(18)SXF2 and later releases support NAC. Note For complete

More information

Configuring VRRP. Finding Feature Information. Contents

Configuring VRRP. Finding Feature Information. Contents Configuring VRRP First Published: May 2, 2005 Last Updated: July 30, 2010 The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual

More information

eigrp log-neighbor-warnings through functions Commands

eigrp log-neighbor-warnings through functions Commands CHAPTER 12 eigrp log-neighbor-warnings through functions Commands 12-1 eigrp log-neighbor-changes Chapter 12 eigrp log-neighbor-changes To enable the logging of EIGRP neighbor adjacency changes, use the

More information

Configuring Certificate Enrollment for a PKI

Configuring Certificate Enrollment for a PKI This module describes the different methods available for certificate enrollment and how to set up each method for a participating PKI peer. Certificate enrollment, which is the process of obtaining a

More information

Configuring IKEv2 Load Balancer

Configuring IKEv2 Load Balancer The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This

More information

HOME-SYD-RTR02 GETVPN Configuration

HOME-SYD-RTR02 GETVPN Configuration GETVPN OVER DMVPN Topology Details HOME-SYD-RTR02 is GETVPN KS. R2 & R3 are GETVPN Members. R2 is DMVPN Hub. R3 is DMVPN Spoke. HOME-PIX01 is Firewall between R2 and R3. IP Addressing Details HOME-SYD-RTR01

More information

icmp idle-timeout icmp idle-timeout seconds no icmp idle-timeout seconds Syntax Description seconds ICMP timeout, in seconds. The default is 10.

icmp idle-timeout icmp idle-timeout seconds no icmp idle-timeout seconds Syntax Description seconds ICMP timeout, in seconds. The default is 10. icmp idle-timeout icmp idle-timeout To configure the timeout for Internet Control Message Protocol (ICMP) sessions, use the icmp idle-timeout command in parameter-map type inspect configuration mode. To

More information

Cisco Virtual Office: Easy VPN Deployment Guide

Cisco Virtual Office: Easy VPN Deployment Guide Cisco Virtual Office: Easy VPN Deployment Guide This guide provides detailed design and implementation information for deployment of Easy VPN in client mode with the Cisco Virtual Office. Please refer

More information

keepalive (isakmp profile)

keepalive (isakmp profile) keepalive (isakmp profile) keepalive (isakmp profile) To allow the gateway to send dead peer detection (DPD) messages to the peer, use the keepalive command in Internet Security Association Key Management

More information

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M.

aaa max-sessions maximum-number-of-sessions The default value for aaa max-sessions command is platform dependent. Release 15.0(1)M. aaa max-sessions aaa max-sessions To set the maximum number of simultaneous authentication, authorization, and accounting (AAA) connections permitted for a user, use the aaa max-sessions command in global

More information

Reverse Route Injection

Reverse Route Injection Reverse Route Injection Last Updated: October 15, 2012 Reverse route injection (RRI) is the ability to automatically insert static routes in the routing process for those networks and hosts protected by

More information

tacacs-server administration through title-color

tacacs-server administration through title-color tacacs-server administration through title-color tacacs server, page 4 tacacs-server administration, page 6 tacacs-server directed-request, page 7 tacacs-server dns-alias-lookup, page 9 tacacs-server domain-stripping,

More information

mpls ldp atm vc-merge through mpls static binding ipv4

mpls ldp atm vc-merge through mpls static binding ipv4 mpls ldp atm vc-merge through mpls static binding ipv4 mpls ldp atm vc-merge, page 3 mpls ldp autoconfig, page 5 mpls ldp backoff, page 7 mpls ldp discovery, page 9 mpls ldp discovery transport-address,

More information

Configuring Certificate Enrollment for a PKI

Configuring Certificate Enrollment for a PKI Configuring Certificate Enrollment for a PKI First Published: May 2, 2005 Last Updated: July 31, 2009 Certificate enrollment, which is the process of obtaining a certificate from a certification authority

More information

show ipv6 nat translations, on page 71

show ipv6 nat translations, on page 71 show ip masks, on page 4 show ip nat limits all-host, on page 5 show ip nat limits all-vrf, on page 7 show ip nat nvi statistics, on page 9 show ip nat nvi translations, on page 11 show ip nat redundancy,

More information

ca trust-point through clear eou

ca trust-point through clear eou ca trust-point, on page 3 cabundle url, on page 5 cache authentication profile (server group configuration), on page 7 cache authorization profile (server group configuration), on page 8 cache clear age,

More information

Configuring Security for the ML-Series Card

Configuring Security for the ML-Series Card 19 CHAPTER Configuring Security for the ML-Series Card This chapter describes the security features of the ML-Series card. This chapter includes the following major sections: Understanding Security, page

More information

crypto ca authenticate through crypto ca trustpoint

crypto ca authenticate through crypto ca trustpoint crypto ca authenticate through crypto ca trustpoint crypto ca authenticate, page 2 crypto ca enroll, page 4 crypto ca trustpoint, page 7 1 crypto ca authenticate crypto ca authenticate through crypto ca

More information

Configuring Dynamic Addressing on the GGSN

Configuring Dynamic Addressing on the GGSN CHAPTER 11 This chapter describes how to configure dynamic IP addressing on the gateway GRPS support node (GGSN). The tasks in this chapter apply to IPv4 PDP contexts only. For information on IPv6 addressing,

More information

Configuring Authorization and Revocation of Certificates in a PKI

Configuring Authorization and Revocation of Certificates in a PKI Configuring Authorization and Revocation of Certificates in a PKI This module describes how to configure authorization and revocation of certificates in a public key infrastructure (PKI). It includes information

More information

sa ipsec sa ipsec {sequence-number} no sa ipsec {sequence-number} Syntax Description Command Default None Command Modes

sa ipsec sa ipsec {sequence-number} no sa ipsec {sequence-number} Syntax Description Command Default None Command Modes sa ipsec sa ipsec To specify the IP security (IPsec) security association (SA) policy information to be used for a Group Domain of Interpretation (GDOI) group and to enter GDOI SA IPsec configuration mode,

More information

Cisco IOS HTTP Services Command Reference

Cisco IOS HTTP Services Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Configuring FlexVPN Spoke to Spoke

Configuring FlexVPN Spoke to Spoke Last Published Date: March 28, 2014 The FlexVPN Spoke to Spoke feature enables a FlexVPN client to establish a direct crypto tunnel with another FlexVPN client leveraging virtual tunnel interfaces (VTI),

More information

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 42 This chapter describes how to configure web-based authentication. It consists of these sections: About Web-Based Authentication, page 42-1, page 42-5 Displaying Web-Based Authentication Status,

More information

mitigation through outgoing

mitigation through outgoing mitigation, page 3 mls acl tcam consistency enable, page 5 mls acl tcam default-result, page 6 mls acl tcam override dynamic dhcp-snooping, page 8 mls acl tcam share-global, page 9 mls acl vacl apply-self,

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication CHAPTER 61 This chapter describes how to configure web-based authentication. Cisco IOS Release 12.2(33)SXH and later releases support web-based authentication. Note For complete syntax and usage information

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

IPsec Anti-Replay Window Expanding and Disabling

IPsec Anti-Replay Window Expanding and Disabling IPsec Anti-Replay Window Expanding and Disabling Cisco IP security (IPsec) authentication provides anti-replay protection against an attacker duplicating encrypted packets by assigning a unique sequence

More information

Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S

Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Configuring WAN Backhaul Redundancy

Configuring WAN Backhaul Redundancy CHAPTER 7 This chapter describes how to configure WAN backhaul redundancy for cellular and WiMAX interfaces on the Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router).

More information

Configuring NAT for High Availability

Configuring NAT for High Availability Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient

More information

Configuring Modem Transport Support for VoIP

Configuring Modem Transport Support for VoIP Configuring Modem Transport Support for VoIP This chapter explains how to configure modem transport support for Voice over IP (VoIP) and contains the following sections: Modem Transport Support Overview,

More information

Cisco IOS HTTP Services Command Reference

Cisco IOS HTTP Services Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

crypto aaa attribute list through crypto ipsec transform-set

crypto aaa attribute list through crypto ipsec transform-set crypto aaa attribute list through crypto ipsec transform-set crypto aaa attribute list, page 4 crypto ca authenticate, page 7 crypto ca cert validate, page 9 crypto ca certificate chain, page 11 crypto

More information

IPsec Dead Peer Detection Periodic Message Option

IPsec Dead Peer Detection Periodic Message Option IPsec Dead Peer Detection Periodic Message The IPsec Dead Peer Detection Periodic Message feature is used to configure the router to query the liveliness of its Internet Key Exchange (IKE) peer at regular

More information

Configuring HSRP. Understanding HSRP CHAPTER

Configuring HSRP. Understanding HSRP CHAPTER CHAPTER 40 This chapter describes how to use Hot Standby Router Protocol (HSRP) on the Cisco ME 3400E Ethernet Access switch to provide routing redundancy for routing IP traffic without being dependent

More information

SIP Gateway Support for the bind Command

SIP Gateway Support for the bind Command SIP Gateway Support for the bind Command Last Updated: December 16, 2011 The Gateway Support for the bind Command feature introduces the bind command, which allows you to configure the source IP address

More information

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Identity-Based Networking Services Command Reference, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) First Published: January 29, 2013 Last Modified: January 29, 2013 Americas Headquarters Cisco Systems,

More information

Cisco ASR 9000 Series Aggregation Services Router System Security Command Reference, Release 5.3.x

Cisco ASR 9000 Series Aggregation Services Router System Security Command Reference, Release 5.3.x Cisco ASR 9000 Series Aggregation Services Router System Security Command Reference, Release 5.3.x First Published: January 30, 2015 Last Modified: September 11, 2015 Americas Headquarters Cisco Systems,

More information

eap, page 3 Cisco IOS Security Command Reference: Commands D to L 1

eap, page 3 Cisco IOS Security Command Reference: Commands D to L 1 E eap, page 3 eap (IKEv2 profile), page 5 eckeypair, page 7 eku (cs-server), page 9 eku request, page 11 email (IKEv2 profile), page 13 enable, page 14 enable algorithm-type, page 18 enable password, page

More information

IPv6 over IPv4 GRE Tunnel Protection

IPv6 over IPv4 GRE Tunnel Protection The feature allows both IPv6 unicast and multicast traffic to pass through a protected generic routing encapsulation (GRE) tunnel. Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions

More information

FlexVPN Between a Router and an ASA with Next Generation Encryption Configuration Example

FlexVPN Between a Router and an ASA with Next Generation Encryption Configuration Example FlexVPN Between a Router and an ASA with Next Generation Encryption Configuration Example Document ID: 116008 Contributed by Graham Bartlett, Cisco TAC Engineer. Mar 26, 2013 Contents Introduction Prerequisites

More information

Configuring Dynamic Addressing on the GGSN

Configuring Dynamic Addressing on the GGSN CHAPTER 13 This chapter describes how to configure dynamic IP addressing on the gateway GRPS support node (GGSN). Note Dynamic IP addressing is not supported for IPv6 and PPP PDP types. Therefore, the

More information

FlexVPN and Internet Key Exchange Version 2 Configuration Guide, Cisco IOS Release 15M&T

FlexVPN and Internet Key Exchange Version 2 Configuration Guide, Cisco IOS Release 15M&T FlexVPN and Internet Key Exchange Version 2 Configuration Guide, Cisco IOS Release 15M&T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Static NAT Mapping with HSRP

Static NAT Mapping with HSRP This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient IP networks. This network resiliency is required where application

More information

Configuring Aggregate Authentication

Configuring Aggregate Authentication The FlexVPN RA - Aggregate Auth Support for AnyConnect feature implements aggregate authentication method by extending support for Cisco AnyConnect client that uses the proprietary AnyConnect EAP authentication

More information

IPsec Virtual Tunnel Interfaces

IPsec Virtual Tunnel Interfaces IPsec virtual tunnel interfaces (VTIs) provide a routable interface type for terminating IPsec tunnels and an easy way to define protection between sites to form an overlay network IPsec VTIs simplify

More information

Public Key Infrastructure Configuration Guide, Cisco IOS Release 15SY

Public Key Infrastructure Configuration Guide, Cisco IOS Release 15SY Public Key Infrastructure Configuration Guide, Cisco IOS Release 15SY Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15M&T

Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15M&T Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15M&T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

channel-group through cut-through

channel-group through cut-through channel-group, page 2 channel-group (interface), page 7 clear counters, page 13 clear lacp counters, page 17 cut-through, page 18 1 channel-group channel-group To configure serial WAN on a T1 or E1 interface,

More information

ip nat source through iterate-ip-addrs

ip nat source through iterate-ip-addrs ip nat source through iterate-ip-addrs ip nat source, page 4 ip nat stateful id, page 7 ip nat switchover replication http, page 10 ip nat translation, page 11 ip nat translation (timeout), page 12 ip

More information

Overview of the IPsec Features

Overview of the IPsec Features CHAPTER 2 This chapter provides an overview of the IPsec features of the VSPA. This chapter includes the following sections: Overview of Basic IPsec and IKE Configuration Concepts, page 2-1 Configuring

More information

Configuring Internet Key Exchange Security Protocol

Configuring Internet Key Exchange Security Protocol Configuring Internet Key Exchange Security Protocol This chapter describes how to configure the Internet Key Exchange (IKE) protocol. IKE is a key management protocol standard that is used in conjunction

More information

ipv6 mobile home-agent (global configuration)

ipv6 mobile home-agent (global configuration) ipv6 mobile home-agent (global configuration) ipv6 mobile home-agent (global configuration) To enter home agent configuration mode, use the ipv6 mobile home-agent command in global configuration mode.

More information

First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Effective with Cisco IOS Release 15.0(1)M, the ssg default-network command is not available in Cisco IOS software.

Effective with Cisco IOS Release 15.0(1)M, the ssg default-network command is not available in Cisco IOS software. ssg default-network ssg default-network Effective with Cisco IOS, the ssg default-network command is not available in Cisco IOS software. To specify the default network IP address or subnet and mask, use

More information

A-B I N D E X. backbone networks, fault tolerance, 174

A-B I N D E X. backbone networks, fault tolerance, 174 I N D E X A-B access links fault tolerance, 175 176 multiple IKE identities, 176 182 single IKE identity with MLPPP, 188 189 with single IKE identity, 183 187 active/standby stateful failover model, 213

More information

HSRP MD5 Authentication

HSRP MD5 Authentication Finding Feature Information, page 1 Information About, page 1 How to Configure, page 2 Configuration Examples for, page 8 Additional References, page 9 Feature Information for, page 10 Finding Feature

More information

Public Key Infrastructure Configuration Guide, Cisco IOS XE Release 2

Public Key Infrastructure Configuration Guide, Cisco IOS XE Release 2 Public Key Infrastructure Configuration Guide, Cisco IOS XE Release 2 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

GET VPN GM Removal and Policy Trigger

GET VPN GM Removal and Policy Trigger The feature lets you easily remove unwanted group members (GMs) from the group encrypted transport (GET) VPN network, provides a rekey triggering method to install new security associations (SAs) and remove

More information

L2TP IPsec Support for NAT and PAT Windows Clients

L2TP IPsec Support for NAT and PAT Windows Clients L2TP IPsec Support for NAT and PAT Windows Clients The L2TP IPsec Support for NAT and PAT Windows Clients feature allows mulitple Windows client to connect to an IPsec-enabled Cisco IOS Layer 2 Tunneling

More information

ip mfib through ip multicast-routing

ip mfib through ip multicast-routing ip mfib through ip multicast-routing ip mfib, page 3 ip mfib cef, page 4 ip mfib forwarding, page 6 ip mrm, page 8 ip mrm accept-manager, page 10 ip mrm manager, page 12 ip mroute, page 14 ip mroute-cache,

More information

Cisco ASR 9000 Series Aggregation Services Router System Security Command Reference, Release 4.1

Cisco ASR 9000 Series Aggregation Services Router System Security Command Reference, Release 4.1 Cisco ASR 9000 Series Aggregation Services Router System Security Command Reference, Release 4.1 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

FA Service Configuration Mode Commands

FA Service Configuration Mode Commands FA Service Configuration Mode Commands The Foreign Agent Service Configuration Mode is used to create and manage the Foreign Agent (FA) services associated with the current context. Important The commands

More information

Configuring Web-Based Authentication

Configuring Web-Based Authentication This chapter describes how to configure web-based authentication on the switch. It contains these sections: Finding Feature Information, page 1 Web-Based Authentication Overview, page 1 How to Configure

More information

Configuring and Managing a Certificate Server for PKI Deployment

Configuring and Managing a Certificate Server for PKI Deployment Configuring and Managing a Certificate Server for PKI Deployment This module describes how to set up and manage a Cisco IOS certificate server for public key infrastructure (PKI) deployment. A certificate

More information

Configuring and Managing a Certificate Server for PKI Deployment

Configuring and Managing a Certificate Server for PKI Deployment Configuring and Managing a Certificate Server for PKI Deployment This module describes how to set up and manage a Cisco IOS certificate server for public key infrastructure (PKI) deployment. A certificate

More information

mls acl tcam default-result

mls acl tcam default-result mls acl tcam default-result mls acl tcam default-result To set the default action during the ACL TCAM update, use the mls acl tcam default-result command in global configuration mode. To return to the

More information

AnyConnect to IOS Headend Over IPsec with IKEv2 and Certificates Configuration Example

AnyConnect to IOS Headend Over IPsec with IKEv2 and Certificates Configuration Example AnyConnect to IOS Headend Over IPsec with IKEv2 and Certificates Configuration Example Document ID: 115014 Contributed by Marcin Latosiewicz and Atri Basu, Cisco TAC Engineers. Jan 18, 2013 Contents Introduction

More information

Implementing ADSL and Deploying Dial Access for IPv6

Implementing ADSL and Deploying Dial Access for IPv6 Implementing ADSL and Deploying Dial Access for IPv6 Last Updated: July 31, 2012 Finding Feature Information, page 1 Restrictions for Implementing ADSL and Deploying Dial Access for IPv6, page 1 Information

More information

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router MWA Deployment Guide Mobile Workforce Architecture: VPN Deployment Guide for Microsoft Windows Mobile and Android Devices with Cisco Integrated Services Router Generation 2 This deployment guide explains

More information

Implementing DHCP for IPv6

Implementing DHCP for IPv6 This module describes how to configure Dynamic Host Configuration Protocol (DHCP) for IPv6. DHCPv6 Prefix Delegation, page 1 How to Implement DHCP for IPv6, page 6 DHCPv6 Prefix Delegation The IPv6 Access

More information

Setting Up OER Network Components

Setting Up OER Network Components Setting Up OER Network Components First Published: January 29, 2007 Last Updated: August 21, 2007 This module describes the concepts and tasks to help you set up the network components required for an

More information

Home Agent Redundancy

Home Agent Redundancy CHAPTER 5 This chapter discusses several concepts related to, how Home Agent redundancy works, and how to configure redundancy on the Cisco Mobile Wireless Home Agent. This chapter includes the following

More information